Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-43480 (GCVE-0-2025-43480)
Vulnerability from cvelistv5 – Published: 2025-11-04 01:16 – Updated: 2025-12-18 18:35- A malicious website may exfiltrate data cross-origin
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-43480",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-04T15:32:41.895934Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-942",
"description": "CWE-942 Permissive Cross-domain Policy with Untrusted Domains",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-18T18:35:55.142Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Safari",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "visionOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "26.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. A malicious website may exfiltrate data cross-origin."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "A malicious website may exfiltrate data cross-origin",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-17T20:46:52.046Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/125640"
},
{
"url": "https://support.apple.com/en-us/125637"
},
{
"url": "https://support.apple.com/en-us/125634"
},
{
"url": "https://support.apple.com/en-us/125638"
},
{
"url": "https://support.apple.com/en-us/125639"
},
{
"url": "https://support.apple.com/en-us/125632"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2025-43480",
"datePublished": "2025-11-04T01:16:35.173Z",
"dateReserved": "2025-04-16T15:24:37.126Z",
"dateUpdated": "2025-12-18T18:35:55.142Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-43480\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-11-04T02:15:52.400\",\"lastModified\":\"2025-12-17T21:16:07.700\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved checks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. A malicious website may exfiltrate data cross-origin.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-942\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"CFF118CE-3F13-43BE-B250-5579E1C842EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"6D51AEDC-9086-4010-B3BF-C652D65D09C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"3981A7BE-BC98-4C6F-AE38-D68839368925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"290E0D29-CB5B-45A7-9FE3-FD2030B1D1A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"7DFD3616-65CA-4E5C-849C-3C20ACBCB610\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"26.1\",\"matchCriteriaId\":\"9F9D7F76-13FB-407C-94E5-221B93021568\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/125632\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125634\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/125637\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125638\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125639\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/125640\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-43480\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-04T15:32:41.895934Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-942\", \"description\": \"CWE-942 Permissive Cross-domain Policy with Untrusted Domains\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-04T15:35:00.641Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"visionOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"26.1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/125640\"}, {\"url\": \"https://support.apple.com/en-us/125637\"}, {\"url\": \"https://support.apple.com/en-us/125634\"}, {\"url\": \"https://support.apple.com/en-us/125638\"}, {\"url\": \"https://support.apple.com/en-us/125639\"}, {\"url\": \"https://support.apple.com/en-us/125632\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved checks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. A malicious website may exfiltrate data cross-origin.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"A malicious website may exfiltrate data cross-origin\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-12-17T20:46:52.046Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-43480\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-17T20:46:52.046Z\", \"dateReserved\": \"2025-04-16T15:24:37.126Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-11-04T01:16:35.173Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-0961
Vulnerability from certfr_avis - Published: 2025-11-04 - Updated: 2025-11-04
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | macOS Tahoe versions antérieures à 26.1 | ||
| Apple | iPadOS | iPadOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7.2 | ||
| Apple | Safari | Safari versions antérieures à 26.1 | ||
| Apple | Xcode | Xcode versions antérieures à 26.1 | ||
| Apple | watchOS | watchOS versions antérieures à 26.1 | ||
| Apple | iOS | iOS versions antérieures à 26.1 | ||
| Apple | tvOS | tvOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8.2 | ||
| Apple | visionOS | visionOS versions antérieures à 26.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-43292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
},
{
"name": "CVE-2025-43505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43505"
},
{
"name": "CVE-2025-43432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
},
{
"name": "CVE-2025-43372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
},
{
"name": "CVE-2025-43426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43426"
},
{
"name": "CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"name": "CVE-2025-43449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43449"
},
{
"name": "CVE-2025-43348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43348"
},
{
"name": "CVE-2025-43351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43351"
},
{
"name": "CVE-2025-43373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43373"
},
{
"name": "CVE-2025-43441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43441"
},
{
"name": "CVE-2025-43443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
},
{
"name": "CVE-2025-43476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43476"
},
{
"name": "CVE-2025-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
},
{
"name": "CVE-2025-43448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43448"
},
{
"name": "CVE-2025-43497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43497"
},
{
"name": "CVE-2025-43446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43446"
},
{
"name": "CVE-2025-43500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43500"
},
{
"name": "CVE-2025-43431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
},
{
"name": "CVE-2025-43452",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43452"
},
{
"name": "CVE-2025-43504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43504"
},
{
"name": "CVE-2025-43467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43467"
},
{
"name": "CVE-2025-43496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43496"
},
{
"name": "CVE-2025-43420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43420"
},
{
"name": "CVE-2025-43450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43450"
},
{
"name": "CVE-2025-43406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43406"
},
{
"name": "CVE-2025-43402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43402"
},
{
"name": "CVE-2025-43384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43384"
},
{
"name": "CVE-2025-43434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
},
{
"name": "CVE-2025-43422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43422"
},
{
"name": "CVE-2025-43503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43503"
},
{
"name": "CVE-2025-43502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43502"
},
{
"name": "CVE-2025-43440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2025-43427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
},
{
"name": "CVE-2025-43394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43394"
},
{
"name": "CVE-2025-43335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43335"
},
{
"name": "CVE-2025-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
},
{
"name": "CVE-2025-43411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43411"
},
{
"name": "CVE-2025-43469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43469"
},
{
"name": "CVE-2025-43498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43498"
},
{
"name": "CVE-2025-43424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43424"
},
{
"name": "CVE-2025-43423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43423"
},
{
"name": "CVE-2025-43472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43472"
},
{
"name": "CVE-2025-43459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43459"
},
{
"name": "CVE-2025-43392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
},
{
"name": "CVE-2025-43462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43462"
},
{
"name": "CVE-2025-43401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43401"
},
{
"name": "CVE-2025-43386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43386"
},
{
"name": "CVE-2025-43493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43493"
},
{
"name": "CVE-2025-43481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43481"
},
{
"name": "CVE-2025-43405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43405"
},
{
"name": "CVE-2025-43506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43506"
},
{
"name": "CVE-2025-43322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43322"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-43400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43400"
},
{
"name": "CVE-2025-43468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43468"
},
{
"name": "CVE-2025-43395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43395"
},
{
"name": "CVE-2025-43421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
},
{
"name": "CVE-2025-43435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43435"
},
{
"name": "CVE-2025-43464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43464"
},
{
"name": "CVE-2025-43442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43442"
},
{
"name": "CVE-2025-43377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43377"
},
{
"name": "CVE-2025-43438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43438"
},
{
"name": "CVE-2025-43460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43460"
},
{
"name": "CVE-2025-43429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
},
{
"name": "CVE-2025-43407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43407"
},
{
"name": "CVE-2025-43334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43334"
},
{
"name": "CVE-2025-43414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43414"
},
{
"name": "CVE-2025-43385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43385"
},
{
"name": "CVE-2025-43444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43444"
},
{
"name": "CVE-2025-43404",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43404"
},
{
"name": "CVE-2025-43495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43495"
},
{
"name": "CVE-2025-43465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43465"
},
{
"name": "CVE-2025-43461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43461"
},
{
"name": "CVE-2025-43294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
},
{
"name": "CVE-2025-43390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43390"
},
{
"name": "CVE-2025-43499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43499"
},
{
"name": "CVE-2025-43350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43350"
},
{
"name": "CVE-2025-43391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43391"
},
{
"name": "CVE-2025-43378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43378"
},
{
"name": "CVE-2025-43473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43473"
},
{
"name": "CVE-2025-43445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43445"
},
{
"name": "CVE-2025-43338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43338"
},
{
"name": "CVE-2025-43409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43409"
},
{
"name": "CVE-2025-43399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43399"
},
{
"name": "CVE-2025-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43383"
},
{
"name": "CVE-2025-43474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43474"
},
{
"name": "CVE-2025-43471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43471"
},
{
"name": "CVE-2025-43387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43387"
},
{
"name": "CVE-2025-43479",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43479"
},
{
"name": "CVE-2025-43447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43447"
},
{
"name": "CVE-2025-43477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43477"
},
{
"name": "CVE-2025-43413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43413"
},
{
"name": "CVE-2025-43507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43507"
},
{
"name": "CVE-2025-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43336"
},
{
"name": "CVE-2025-43433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43433"
},
{
"name": "CVE-2025-43430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
},
{
"name": "CVE-2025-43337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
},
{
"name": "CVE-2025-43380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43380"
},
{
"name": "CVE-2025-43397",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43397"
},
{
"name": "CVE-2025-43455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43455"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-43412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43412"
},
{
"name": "CVE-2025-43388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43388"
},
{
"name": "CVE-2025-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43396"
},
{
"name": "CVE-2025-43454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43454"
},
{
"name": "CVE-2025-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43439"
},
{
"name": "CVE-2025-43381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43381"
},
{
"name": "CVE-2025-43382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43382"
},
{
"name": "CVE-2025-43466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43466"
},
{
"name": "CVE-2025-43364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43364"
},
{
"name": "CVE-2025-43393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43393"
},
{
"name": "CVE-2025-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43389"
},
{
"name": "CVE-2025-43457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43457"
},
{
"name": "CVE-2025-43361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43361"
},
{
"name": "CVE-2025-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43398"
},
{
"name": "CVE-2025-31199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31199"
},
{
"name": "CVE-2025-43408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43408"
},
{
"name": "CVE-2025-43379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43379"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-43425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
},
{
"name": "CVE-2025-43478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43478"
},
{
"name": "CVE-2025-43436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43436"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-43463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43463"
}
],
"initial_release_date": "2025-11-04T00:00:00",
"last_revision_date": "2025-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0961",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125639",
"url": "https://support.apple.com/en-us/125639"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125640",
"url": "https://support.apple.com/en-us/125640"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125634",
"url": "https://support.apple.com/en-us/125634"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125632",
"url": "https://support.apple.com/en-us/125632"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125638",
"url": "https://support.apple.com/en-us/125638"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125635",
"url": "https://support.apple.com/en-us/125635"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125641",
"url": "https://support.apple.com/en-us/125641"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125636",
"url": "https://support.apple.com/en-us/125636"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125637",
"url": "https://support.apple.com/en-us/125637"
}
]
}
CERTFR-2025-AVI-0961
Vulnerability from certfr_avis - Published: 2025-11-04 - Updated: 2025-11-04
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | macOS Tahoe versions antérieures à 26.1 | ||
| Apple | iPadOS | iPadOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7.2 | ||
| Apple | Safari | Safari versions antérieures à 26.1 | ||
| Apple | Xcode | Xcode versions antérieures à 26.1 | ||
| Apple | watchOS | watchOS versions antérieures à 26.1 | ||
| Apple | iOS | iOS versions antérieures à 26.1 | ||
| Apple | tvOS | tvOS versions antérieures à 26.1 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8.2 | ||
| Apple | visionOS | visionOS versions antérieures à 26.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26.1",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-43292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
},
{
"name": "CVE-2025-43505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43505"
},
{
"name": "CVE-2025-43432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
},
{
"name": "CVE-2025-43372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
},
{
"name": "CVE-2025-43426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43426"
},
{
"name": "CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"name": "CVE-2025-43449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43449"
},
{
"name": "CVE-2025-43348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43348"
},
{
"name": "CVE-2025-43351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43351"
},
{
"name": "CVE-2025-43373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43373"
},
{
"name": "CVE-2025-43441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43441"
},
{
"name": "CVE-2025-43443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
},
{
"name": "CVE-2025-43476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43476"
},
{
"name": "CVE-2025-30465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30465"
},
{
"name": "CVE-2025-43448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43448"
},
{
"name": "CVE-2025-43497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43497"
},
{
"name": "CVE-2025-43446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43446"
},
{
"name": "CVE-2025-43500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43500"
},
{
"name": "CVE-2025-43431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
},
{
"name": "CVE-2025-43452",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43452"
},
{
"name": "CVE-2025-43504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43504"
},
{
"name": "CVE-2025-43467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43467"
},
{
"name": "CVE-2025-43496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43496"
},
{
"name": "CVE-2025-43420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43420"
},
{
"name": "CVE-2025-43450",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43450"
},
{
"name": "CVE-2025-43406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43406"
},
{
"name": "CVE-2025-43402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43402"
},
{
"name": "CVE-2025-43384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43384"
},
{
"name": "CVE-2025-43434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
},
{
"name": "CVE-2025-43422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43422"
},
{
"name": "CVE-2025-43503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43503"
},
{
"name": "CVE-2025-43502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43502"
},
{
"name": "CVE-2025-43440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2025-43427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
},
{
"name": "CVE-2025-43394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43394"
},
{
"name": "CVE-2025-43335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43335"
},
{
"name": "CVE-2025-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
},
{
"name": "CVE-2025-43411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43411"
},
{
"name": "CVE-2025-43469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43469"
},
{
"name": "CVE-2025-43498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43498"
},
{
"name": "CVE-2025-43424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43424"
},
{
"name": "CVE-2025-43423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43423"
},
{
"name": "CVE-2025-43472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43472"
},
{
"name": "CVE-2025-43459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43459"
},
{
"name": "CVE-2025-43392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
},
{
"name": "CVE-2025-43462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43462"
},
{
"name": "CVE-2025-43401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43401"
},
{
"name": "CVE-2025-43386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43386"
},
{
"name": "CVE-2025-43493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43493"
},
{
"name": "CVE-2025-43481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43481"
},
{
"name": "CVE-2025-43405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43405"
},
{
"name": "CVE-2025-43506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43506"
},
{
"name": "CVE-2025-43322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43322"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-43400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43400"
},
{
"name": "CVE-2025-43468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43468"
},
{
"name": "CVE-2025-43395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43395"
},
{
"name": "CVE-2025-43421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
},
{
"name": "CVE-2025-43435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43435"
},
{
"name": "CVE-2025-43464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43464"
},
{
"name": "CVE-2025-43442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43442"
},
{
"name": "CVE-2025-43377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43377"
},
{
"name": "CVE-2025-43438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43438"
},
{
"name": "CVE-2025-43460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43460"
},
{
"name": "CVE-2025-43429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
},
{
"name": "CVE-2025-43407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43407"
},
{
"name": "CVE-2025-43334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43334"
},
{
"name": "CVE-2025-43414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43414"
},
{
"name": "CVE-2025-43385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43385"
},
{
"name": "CVE-2025-43444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43444"
},
{
"name": "CVE-2025-43404",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43404"
},
{
"name": "CVE-2025-43495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43495"
},
{
"name": "CVE-2025-43465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43465"
},
{
"name": "CVE-2025-43461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43461"
},
{
"name": "CVE-2025-43294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
},
{
"name": "CVE-2025-43390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43390"
},
{
"name": "CVE-2025-43499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43499"
},
{
"name": "CVE-2025-43350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43350"
},
{
"name": "CVE-2025-43391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43391"
},
{
"name": "CVE-2025-43378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43378"
},
{
"name": "CVE-2025-43473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43473"
},
{
"name": "CVE-2025-43445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43445"
},
{
"name": "CVE-2025-43338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43338"
},
{
"name": "CVE-2025-43409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43409"
},
{
"name": "CVE-2025-43399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43399"
},
{
"name": "CVE-2025-43383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43383"
},
{
"name": "CVE-2025-43474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43474"
},
{
"name": "CVE-2025-43471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43471"
},
{
"name": "CVE-2025-43387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43387"
},
{
"name": "CVE-2025-43479",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43479"
},
{
"name": "CVE-2025-43447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43447"
},
{
"name": "CVE-2025-43477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43477"
},
{
"name": "CVE-2025-43413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43413"
},
{
"name": "CVE-2025-43507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43507"
},
{
"name": "CVE-2025-43336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43336"
},
{
"name": "CVE-2025-43433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43433"
},
{
"name": "CVE-2025-43430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
},
{
"name": "CVE-2025-43337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
},
{
"name": "CVE-2025-43380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43380"
},
{
"name": "CVE-2025-43397",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43397"
},
{
"name": "CVE-2025-43455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43455"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-43412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43412"
},
{
"name": "CVE-2025-43388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43388"
},
{
"name": "CVE-2025-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43396"
},
{
"name": "CVE-2025-43454",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43454"
},
{
"name": "CVE-2025-43439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43439"
},
{
"name": "CVE-2025-43381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43381"
},
{
"name": "CVE-2025-43382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43382"
},
{
"name": "CVE-2025-43466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43466"
},
{
"name": "CVE-2025-43364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43364"
},
{
"name": "CVE-2025-43393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43393"
},
{
"name": "CVE-2025-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43389"
},
{
"name": "CVE-2025-43457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43457"
},
{
"name": "CVE-2025-43361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43361"
},
{
"name": "CVE-2025-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43398"
},
{
"name": "CVE-2025-31199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31199"
},
{
"name": "CVE-2025-43408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43408"
},
{
"name": "CVE-2025-43379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43379"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-43425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
},
{
"name": "CVE-2025-43478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43478"
},
{
"name": "CVE-2025-43436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43436"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-43463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43463"
}
],
"initial_release_date": "2025-11-04T00:00:00",
"last_revision_date": "2025-11-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0961",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125639",
"url": "https://support.apple.com/en-us/125639"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125640",
"url": "https://support.apple.com/en-us/125640"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125634",
"url": "https://support.apple.com/en-us/125634"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125632",
"url": "https://support.apple.com/en-us/125632"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125638",
"url": "https://support.apple.com/en-us/125638"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125635",
"url": "https://support.apple.com/en-us/125635"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125641",
"url": "https://support.apple.com/en-us/125641"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125636",
"url": "https://support.apple.com/en-us/125636"
},
{
"published_at": "2025-11-03",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125637",
"url": "https://support.apple.com/en-us/125637"
}
]
}
RHSA-2024:8180
Vulnerability from csaf_redhat - Published: 2024-10-16 13:09 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8180",
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8180.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:33+00:00",
"generator": {
"date": "2025-12-17T21:48:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:8180",
"initial_release_date": "2024-10-16T13:09:14+00:00",
"revision_history": [
{
"date": "2024-10-16T13:09:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-03-20T19:16:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.src",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.src",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23254",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270289"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: malicious website may exfiltrate audio data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23254"
},
{
"category": "external",
"summary": "RHBZ#2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: malicious website may exfiltrate audio data cross-origin"
},
{
"cve": "CVE-2024-23263",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270290"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23263"
},
{
"category": "external",
"summary": "RHBZ#2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23263"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-23280",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23280"
},
{
"category": "external",
"summary": "RHBZ#2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-23284",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23284"
},
{
"category": "external",
"summary": "RHBZ#2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27838",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-09-25T15:42:35.706000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314702"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27838"
},
{
"category": "external",
"summary": "RHBZ#2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-40866",
"discovery_date": "2024-09-17T00:31:06.549134+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2312724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40866"
},
{
"category": "external",
"summary": "RHBZ#2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121238",
"url": "https://support.apple.com/en-us/121238"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121241",
"url": "https://support.apple.com/en-us/121241"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-17T00:15:49.840000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44187",
"discovery_date": "2024-09-25T15:50:57.927000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314706"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44187"
},
{
"category": "external",
"summary": "RHBZ#2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-16T13:09:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8180"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x",
"AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2025:10364
Vulnerability from csaf_redhat - Published: 2025-07-07 02:28 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10364",
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "2327927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927"
},
{
"category": "external",
"summary": "2327931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931"
},
{
"category": "external",
"summary": "2333841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841"
},
{
"category": "external",
"summary": "2333843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843"
},
{
"category": "external",
"summary": "2333844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844"
},
{
"category": "external",
"summary": "2333845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845"
},
{
"category": "external",
"summary": "2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "2344619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619"
},
{
"category": "external",
"summary": "2344621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621"
},
{
"category": "external",
"summary": "2344622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622"
},
{
"category": "external",
"summary": "2344623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623"
},
{
"category": "external",
"summary": "2344624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624"
},
{
"category": "external",
"summary": "2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "2351802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802"
},
{
"category": "external",
"summary": "2353871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871"
},
{
"category": "external",
"summary": "2353872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872"
},
{
"category": "external",
"summary": "2357909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909"
},
{
"category": "external",
"summary": "2357910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910"
},
{
"category": "external",
"summary": "2357911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911"
},
{
"category": "external",
"summary": "2357913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913"
},
{
"category": "external",
"summary": "2357917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917"
},
{
"category": "external",
"summary": "2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "2357919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919"
},
{
"category": "external",
"summary": "2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "2366501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501"
},
{
"category": "external",
"summary": "2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "2366504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json"
}
],
"title": "Red Hat Security Advisory: webkitgtk4 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:42+00:00",
"generator": {
"date": "2025-12-17T21:48:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:10364",
"initial_release_date": "2025-07-07T02:28:52+00:00",
"revision_history": [
{
"date": "2025-07-07T02:28:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-07T02:28:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-1745",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270151"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-1745"
},
{
"category": "external",
"summary": "RHBZ#2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents"
},
{
"cve": "CVE-2020-9802",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879545"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9802"
},
{
"category": "external",
"summary": "RHBZ#1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9803",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879557"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9803"
},
{
"category": "external",
"summary": "RHBZ#1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9805",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879559"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9805"
},
{
"category": "external",
"summary": "RHBZ#1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9806",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9806"
},
{
"category": "external",
"summary": "RHBZ#1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9807",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879564"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9807"
},
{
"category": "external",
"summary": "RHBZ#1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9843",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879566"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9843"
},
{
"category": "external",
"summary": "RHBZ#1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9850",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879568"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9850"
},
{
"category": "external",
"summary": "RHBZ#1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9862",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879532"
}
],
"notes": [
{
"category": "description",
"text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Command injection in web inspector",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9862"
},
{
"category": "external",
"summary": "RHBZ#1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Command injection in web inspector"
},
{
"cve": "CVE-2020-9893",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879535"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9893"
},
{
"category": "external",
"summary": "RHBZ#1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9894",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879536"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9894"
},
{
"category": "external",
"summary": "RHBZ#1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9895",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9895"
},
{
"category": "external",
"summary": "RHBZ#1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9915",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879540"
}
],
"notes": [
{
"category": "description",
"text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access issue in content security policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9915"
},
{
"category": "external",
"summary": "RHBZ#1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access issue in content security policy"
},
{
"cve": "CVE-2020-9925",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879541"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9925"
},
{
"category": "external",
"summary": "RHBZ#1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9925"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9947",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944331"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9947"
},
{
"category": "external",
"summary": "RHBZ#1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9948",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901214"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9948"
},
{
"category": "external",
"summary": "RHBZ#1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901216"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9951"
},
{
"category": "external",
"summary": "RHBZ#1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9952",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901219"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: input validation issue may lead to a cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9952"
},
{
"category": "external",
"summary": "RHBZ#1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: input validation issue may lead to a cross site scripting"
},
{
"cve": "CVE-2020-9983",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901221"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write may lead to code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9983"
},
{
"category": "external",
"summary": "RHBZ#1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write may lead to code execution"
},
{
"cve": "CVE-2020-13543",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903568"
}
],
"notes": [
{
"category": "description",
"text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13543"
},
{
"category": "external",
"summary": "RHBZ#1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0009.html",
"url": "https://webkitgtk.org/security/WSA-2020-0009.html"
}
],
"release_date": "2020-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1928886"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13558"
},
{
"category": "external",
"summary": "RHBZ#1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0001.html",
"url": "https://webkitgtk.org/security/WSA-2021-0001.html"
}
],
"release_date": "2021-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution"
},
{
"cve": "CVE-2020-13584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901212"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13584"
},
{
"category": "external",
"summary": "RHBZ#1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13753",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13753"
},
{
"category": "external",
"summary": "RHBZ#1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl"
},
{
"cve": "CVE-2020-27918",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944323"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27918"
},
{
"category": "external",
"summary": "RHBZ#1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2020-29623",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944329"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User may be unable to fully delete browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29623"
},
{
"category": "external",
"summary": "RHBZ#1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29623"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: User may be unable to fully delete browsing history"
},
{
"cve": "CVE-2021-1765",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1765"
},
{
"category": "external",
"summary": "RHBZ#1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1765"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1788",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944859"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1788"
},
{
"category": "external",
"summary": "RHBZ#1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1789",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944337"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1789"
},
{
"category": "external",
"summary": "RHBZ#1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1799",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944340"
}
],
"notes": [
{
"category": "description",
"text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1799"
},
{
"category": "external",
"summary": "RHBZ#1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection"
},
{
"cve": "CVE-2021-1801",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944343"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1801"
},
{
"category": "external",
"summary": "RHBZ#1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1817",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986852"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1817"
},
{
"category": "external",
"summary": "RHBZ#1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1820",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986856"
}
],
"notes": [
{
"category": "description",
"text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1820"
},
{
"category": "external",
"summary": "RHBZ#1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure"
},
{
"cve": "CVE-2021-1825",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986858"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue leading to cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1825"
},
{
"category": "external",
"summary": "RHBZ#1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue leading to cross site scripting attack"
},
{
"cve": "CVE-2021-1826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986860"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1826"
},
{
"category": "external",
"summary": "RHBZ#1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-1844",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944862"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1844"
},
{
"category": "external",
"summary": "RHBZ#1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1844"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1870",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944350"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1870"
},
{
"category": "external",
"summary": "RHBZ#1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1870"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1871",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944867"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1871"
},
{
"category": "external",
"summary": "RHBZ#1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-21775",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986863"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21775"
},
{
"category": "external",
"summary": "RHBZ#1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986866"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21779"
},
{
"category": "external",
"summary": "RHBZ#1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980441"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21806"
},
{
"category": "external",
"summary": "RHBZ#1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214"
}
],
"release_date": "2021-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30661",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30661"
},
{
"category": "external",
"summary": "RHBZ#1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Integer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30663"
},
{
"category": "external",
"summary": "RHBZ#1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Integer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30665",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30665"
},
{
"category": "external",
"summary": "RHBZ#1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30666",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986877"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30666"
},
{
"category": "external",
"summary": "RHBZ#1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30682",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986879"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to leak of sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30682"
},
{
"category": "external",
"summary": "RHBZ#1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to leak of sensitive user information"
},
{
"cve": "CVE-2021-30689",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986881"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30689"
},
{
"category": "external",
"summary": "RHBZ#1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30720",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986883"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30720"
},
{
"category": "external",
"summary": "RHBZ#1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers"
},
{
"cve": "CVE-2021-30734",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986886"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30734"
},
{
"category": "external",
"summary": "RHBZ#1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30744",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986888"
}
],
"notes": [
{
"category": "description",
"text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30744"
},
{
"category": "external",
"summary": "RHBZ#1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30749",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986890"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30749"
},
{
"category": "external",
"summary": "RHBZ#1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30758",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986892"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30758"
},
{
"category": "external",
"summary": "RHBZ#1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30758"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30761",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986894"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30761"
},
{
"category": "external",
"summary": "RHBZ#1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30761"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30762"
},
{
"category": "external",
"summary": "RHBZ#1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986900"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30795"
},
{
"category": "external",
"summary": "RHBZ#1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30797",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986902"
}
],
"notes": [
{
"category": "description",
"text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Insufficient checks leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30797"
},
{
"category": "external",
"summary": "RHBZ#1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30797"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Insufficient checks leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30799",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986906"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30799"
},
{
"category": "external",
"summary": "RHBZ#1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-42762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016673"
}
],
"notes": [
{
"category": "description",
"text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: limited sandbox escape via VFS syscalls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42762"
},
{
"category": "external",
"summary": "RHBZ#2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762"
}
],
"release_date": "2021-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: limited sandbox escape via VFS syscalls"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-0108",
"discovery_date": "2022-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037469"
}
],
"notes": [
{
"category": "description",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Inappropriate implementation in Navigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0108"
},
{
"category": "external",
"summary": "RHBZ#2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108"
}
],
"release_date": "2022-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: Inappropriate implementation in Navigation"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-22677",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104788"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22677"
},
{
"category": "external",
"summary": "RHBZ#2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30294",
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082544"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30294"
},
{
"category": "external",
"summary": "RHBZ#2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
},
{
"cve": "CVE-2022-32893",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2121645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32893"
},
{
"category": "external",
"summary": "RHBZ#2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0008.html",
"url": "https://webkitgtk.org/security/WSA-2022-0008.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-08-18T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32912",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128645"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32912"
},
{
"category": "external",
"summary": "RHBZ#2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32919",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271437"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32919"
},
{
"category": "external",
"summary": "RHBZ#2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing."
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-32933",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271441"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A website may able to track visited websites in private browsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32933"
},
{
"category": "external",
"summary": "RHBZ#2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A website may able to track visited websites in private browsing"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42856",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153683"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42856"
},
{
"category": "external",
"summary": "RHBZ#2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-12-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46705",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271444"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46705"
},
{
"category": "external",
"summary": "RHBZ#2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2022-46725",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271446"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46725"
},
{
"category": "external",
"summary": "RHBZ#2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing."
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23529",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2169934"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23529"
},
{
"category": "external",
"summary": "RHBZ#2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0002.html",
"url": "https://webkitgtk.org/security/WSA-2023-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-02-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-27932",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236843"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass via crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27932"
},
{
"category": "external",
"summary": "RHBZ#2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass via crafted web content"
},
{
"cve": "CVE-2023-27954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236844"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Website may be able to track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27954"
},
{
"category": "external",
"summary": "RHBZ#2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Website may be able to track sensitive user information"
},
{
"cve": "CVE-2023-28198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238943"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28198"
},
{
"category": "external",
"summary": "RHBZ#2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free vulnerability"
},
{
"cve": "CVE-2023-28204",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209208"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: an out-of-bounds read when processing malicious content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"category": "external",
"summary": "RHBZ#2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: an out-of-bounds read when processing malicious content"
},
{
"cve": "CVE-2023-28205",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2185724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "WebKitGTK: use-after-free leads to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28205"
},
{
"category": "external",
"summary": "RHBZ#2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28205"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv",
"url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-04-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "WebKitGTK: use-after-free leads to arbitrary code execution"
},
{
"cve": "CVE-2023-32359",
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32359"
},
{
"category": "external",
"summary": "RHBZ#2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32359"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature"
},
{
"cve": "CVE-2023-32370",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238944"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: content security policy blacklist failure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32370"
},
{
"category": "external",
"summary": "RHBZ#2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: content security policy blacklist failure"
},
{
"cve": "CVE-2023-32373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209214"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: a use-after-free when processing maliciously crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"category": "external",
"summary": "RHBZ#2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: a use-after-free when processing maliciously crafted web content"
},
{
"cve": "CVE-2023-32393",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2224608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32393"
},
{
"category": "external",
"summary": "RHBZ#2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0006.html",
"url": "https://webkitgtk.org/security/WSA-2023-0006.html"
}
],
"release_date": "2023-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-32435",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218626"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32435"
},
{
"category": "external",
"summary": "RHBZ#2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-32439",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218640"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32439"
},
{
"category": "external",
"summary": "RHBZ#2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-35074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241403"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-35074"
},
{
"category": "external",
"summary": "RHBZ#2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-37450",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2223000"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37450"
},
{
"category": "external",
"summary": "RHBZ#2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-07-13T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38133",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231015"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: disclose sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38133"
},
{
"category": "external",
"summary": "RHBZ#2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: disclose sensitive information"
},
{
"cve": "CVE-2023-38572",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: bypass Same Origin Policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38572"
},
{
"category": "external",
"summary": "RHBZ#2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38572"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: bypass Same Origin Policy"
},
{
"cve": "CVE-2023-38592",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231017"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38592"
},
{
"category": "external",
"summary": "RHBZ#2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-38594",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231018"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38594"
},
{
"category": "external",
"summary": "RHBZ#2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38595",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231019"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38595"
},
{
"category": "external",
"summary": "RHBZ#2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38597",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231043"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38597"
},
{
"category": "external",
"summary": "RHBZ#2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38599",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231020"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38599"
},
{
"category": "external",
"summary": "RHBZ#2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: track sensitive user information"
},
{
"cve": "CVE-2023-38600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231021"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38600"
},
{
"category": "external",
"summary": "RHBZ#2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38611",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38611"
},
{
"category": "external",
"summary": "RHBZ#2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38611"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-39928",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241400"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39928"
},
{
"category": "external",
"summary": "RHBZ#2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39928"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-40414",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270143"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40414"
},
{
"category": "external",
"summary": "RHBZ#2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-40451",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40451"
},
{
"category": "external",
"summary": "RHBZ#2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code"
},
{
"cve": "CVE-2023-41074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241412"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41074"
},
{
"category": "external",
"summary": "RHBZ#2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-41983",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41983"
},
{
"category": "external",
"summary": "RHBZ#2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial of service"
},
{
"cve": "CVE-2023-41993",
"discovery_date": "2023-09-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41993"
},
{
"category": "external",
"summary": "RHBZ#2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-09-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42833",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270146"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42833"
},
{
"category": "external",
"summary": "RHBZ#2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42843",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271717"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42843"
},
{
"category": "external",
"summary": "RHBZ#2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing a malicious image may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42883"
},
{
"category": "external",
"summary": "RHBZ#2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing a malicious image may lead to a denial of service"
},
{
"cve": "CVE-2023-42890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254327"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42890"
},
{
"category": "external",
"summary": "RHBZ#2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42916",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leads to sensitive data leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42916"
},
{
"category": "external",
"summary": "RHBZ#2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read leads to sensitive data leak"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42950",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271718"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: heap use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42950"
},
{
"category": "external",
"summary": "RHBZ#2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: heap use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42956",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271719"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42956"
},
{
"category": "external",
"summary": "RHBZ#2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content may lead to a denial of service"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23213",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23213"
},
{
"category": "external",
"summary": "RHBZ#2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23252",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270288"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23252"
},
{
"category": "external",
"summary": "RHBZ#2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"title": "webkit: processing malicious web content may lead to denial-of-service"
},
{
"cve": "CVE-2024-23254",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270289"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: malicious website may exfiltrate audio data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23254"
},
{
"category": "external",
"summary": "RHBZ#2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: malicious website may exfiltrate audio data cross-origin"
},
{
"cve": "CVE-2024-23263",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270290"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23263"
},
{
"category": "external",
"summary": "RHBZ#2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23263"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-23271",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2024-09-25T15:33:21.499000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23271"
},
{
"category": "external",
"summary": "RHBZ#2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior"
},
{
"cve": "CVE-2024-23280",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23280"
},
{
"category": "external",
"summary": "RHBZ#2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-23284",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23284"
},
{
"category": "external",
"summary": "RHBZ#2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27834",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282412"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: pointer authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27834"
},
{
"category": "external",
"summary": "RHBZ#2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0003.html",
"url": "https://webkitgtk.org/security/WSA-2024-0003.html"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: pointer authentication bypass"
},
{
"cve": "CVE-2024-27838",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-09-25T15:42:35.706000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314702"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27838"
},
{
"category": "external",
"summary": "RHBZ#2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-40866",
"discovery_date": "2024-09-17T00:31:06.549134+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2312724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40866"
},
{
"category": "external",
"summary": "RHBZ#2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121238",
"url": "https://support.apple.com/en-us/121238"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121241",
"url": "https://support.apple.com/en-us/121241"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-17T00:15:49.840000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44187",
"discovery_date": "2024-09-25T15:50:57.927000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314706"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44187"
},
{
"category": "external",
"summary": "RHBZ#2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-44192",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-03-20T12:50:04.459000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353871"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44192"
},
{
"category": "external",
"summary": "RHBZ#2353871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44296",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2024-11-01T21:16:26.289000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323289"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44296"
},
{
"category": "external",
"summary": "RHBZ#2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44296"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-44308",
"discovery_date": "2024-11-21T23:02:37.337000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2327931"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44308"
},
{
"category": "external",
"summary": "RHBZ#2327931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44308"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-11-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-11-21T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-44309",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-11-21T22:51:08.987000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2327927"
}
],
"notes": [
{
"category": "description",
"text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: data isolation bypass vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44309"
},
{
"category": "external",
"summary": "RHBZ#2327927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44309"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-11-21T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: data isolation bypass vulnerability"
},
{
"cve": "CVE-2024-54467",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-03-20T12:50:18.647000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54467"
},
{
"category": "external",
"summary": "RHBZ#2353872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54467"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
}
],
"release_date": "2025-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-54479",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2024-12-23T13:16:54.800976+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333841"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54479"
},
{
"category": "external",
"summary": "RHBZ#2333841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54479"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:57:33.957000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54502",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-12-23T13:18:24.328627+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333843"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54502"
},
{
"category": "external",
"summary": "RHBZ#2333843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:51.903000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54505",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-12-23T13:18:27.108126+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333844"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54505"
},
{
"category": "external",
"summary": "RHBZ#2333844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54505"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121838",
"url": "https://support.apple.com/en-us/121838"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:31.052000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54508",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-12-23T13:18:30.107103+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333845"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54508"
},
{
"category": "external",
"summary": "RHBZ#2333845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54508"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:14.487000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54543",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-02-10T09:37:24.253576+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344619"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54543"
},
{
"category": "external",
"summary": "RHBZ#2344619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2025-01-27T21:46:30.578000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54551",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:23:49.963000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357909"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54551"
},
{
"category": "external",
"summary": "RHBZ#2357909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2024-54658",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-11T16:12:08.426000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54658"
},
{
"category": "external",
"summary": "RHBZ#2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54658"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2025-24143",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"discovery_date": "2025-02-10T09:40:08.138428+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344621"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24143"
},
{
"category": "external",
"summary": "RHBZ#2344621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
}
],
"release_date": "2025-01-27T21:46:05.639000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2025-24150",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2025-02-10T09:41:46.644580+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344622"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24150"
},
{
"category": "external",
"summary": "RHBZ#2344622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24150"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
}
],
"release_date": "2025-01-27T21:46:32.259000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection"
},
{
"cve": "CVE-2025-24158",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-10T09:43:02.859455+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344623"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24158"
},
{
"category": "external",
"summary": "RHBZ#2344623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122071",
"url": "https://support.apple.com/en-us/122071"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122072",
"url": "https://support.apple.com/en-us/122072"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-27T21:45:49.015000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2025-24162",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-02-10T09:44:11.167306+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344624"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24162"
},
{
"category": "external",
"summary": "RHBZ#2344624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24162"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122066",
"url": "https://support.apple.com/en-us/122066"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122068",
"url": "https://support.apple.com/en-us/122068"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122071",
"url": "https://support.apple.com/en-us/122071"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122072",
"url": "https://support.apple.com/en-us/122072"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122073",
"url": "https://support.apple.com/en-us/122073"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122074",
"url": "https://support.apple.com/en-us/122074"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-27T21:45:54.015000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-24201",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-03-12T22:35:00.430000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2351802"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24201"
},
{
"category": "external",
"summary": "RHBZ#2351802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122281",
"url": "https://support.apple.com/en-us/122281"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122284",
"url": "https://support.apple.com/en-us/122284"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/122285",
"url": "https://support.apple.com/en-us/122285"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0002.html",
"url": "https://webkitgtk.org/security/WSA-2025-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2025-03-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-03-13T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: out-of-bounds write vulnerability"
},
{
"cve": "CVE-2025-24208",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2025-04-07T14:26:09.363000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357910"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24208"
},
{
"category": "external",
"summary": "RHBZ#2357910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24208"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack"
},
{
"cve": "CVE-2025-24209",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-04-07T14:27:43.092000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357911"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24209"
},
{
"category": "external",
"summary": "RHBZ#2357911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-24213",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-04-07T14:28:47.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357913"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A type confusion issue could lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24213"
},
{
"category": "external",
"summary": "RHBZ#2357913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: A type confusion issue could lead to memory corruption"
},
{
"cve": "CVE-2025-24216",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:29:49.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357917"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24216"
},
{
"category": "external",
"summary": "RHBZ#2357917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-30427",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-04-07T14:32:29.265000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357919"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-30427"
},
{
"category": "external",
"summary": "RHBZ#2357919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31205",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-05-15T13:05:47.441000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366501"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31205"
},
{
"category": "external",
"summary": "RHBZ#2366501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31205"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-31257",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:08:57.791000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366504"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31257"
},
{
"category": "external",
"summary": "RHBZ#2366504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:9553
Vulnerability from csaf_redhat - Published: 2024-11-13 15:29 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9553",
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9553.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:37+00:00",
"generator": {
"date": "2025-12-17T21:48:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9553",
"initial_release_date": "2024-11-13T15:29:19+00:00",
"revision_history": [
{
"date": "2024-11-13T15:29:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-04-01T14:14:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40866",
"discovery_date": "2024-09-17T00:31:06.549134+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2312724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40866"
},
{
"category": "external",
"summary": "RHBZ#2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121238",
"url": "https://support.apple.com/en-us/121238"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121241",
"url": "https://support.apple.com/en-us/121241"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-17T00:15:49.840000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44187",
"discovery_date": "2024-09-25T15:50:57.927000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314706"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44187"
},
{
"category": "external",
"summary": "RHBZ#2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-13T15:29:19+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9553"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x",
"AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:9679
Vulnerability from csaf_redhat - Published: 2024-11-14 15:34 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9679",
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9679.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:41+00:00",
"generator": {
"date": "2025-12-17T21:48:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9679",
"initial_release_date": "2024-11-14T15:34:16+00:00",
"revision_history": [
{
"date": "2024-11-14T15:34:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T15:34:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:9646
Vulnerability from csaf_redhat - Published: 2024-11-14 12:02 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9646",
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/",
"url": "https://access.redhat.com/security/vulnerabilities/"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9646.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:38+00:00",
"generator": {
"date": "2025-12-17T21:48:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9646",
"initial_release_date": "2024-11-14T12:02:15+00:00",
"revision_history": [
{
"date": "2024-11-14T12:02:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T12:02:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:02:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9646"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.src",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_8.x86_64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.aarch64",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.i686",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.ppc64le",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.s390x",
"AppStream-8.8.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:8496
Vulnerability from csaf_redhat - Published: 2024-10-28 01:13 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8496",
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/",
"url": "https://access.redhat.com/security/vulnerabilities/"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8496.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:37+00:00",
"generator": {
"date": "2025-12-17T21:48:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:8496",
"initial_release_date": "2024-10-28T01:13:18+00:00",
"revision_history": [
{
"date": "2024-10-28T01:13:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T01:13:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.src",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.src",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T01:13:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8496"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x",
"AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2025:22790
Vulnerability from csaf_redhat - Published: 2025-12-08 01:59 - Updated: 2025-12-22 20:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS (CVE-2025-13502)\n\n* webkitgtk: A website may exfiltrate image data cross-origin (CVE-2025-43392)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43425)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43427)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43429)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43430)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43431)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43432)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43434)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43440)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43443)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43421)\n\n* webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop (CVE-2025-13947)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43458)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-66287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22790",
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"
},
{
"category": "external",
"summary": "2416325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325"
},
{
"category": "external",
"summary": "2416327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327"
},
{
"category": "external",
"summary": "2416329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329"
},
{
"category": "external",
"summary": "2416330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330"
},
{
"category": "external",
"summary": "2416331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331"
},
{
"category": "external",
"summary": "2416332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332"
},
{
"category": "external",
"summary": "2416334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334"
},
{
"category": "external",
"summary": "2416335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335"
},
{
"category": "external",
"summary": "2416336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336"
},
{
"category": "external",
"summary": "2416337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337"
},
{
"category": "external",
"summary": "2416355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355"
},
{
"category": "external",
"summary": "2418576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576"
},
{
"category": "external",
"summary": "2418855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855"
},
{
"category": "external",
"summary": "2418857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22790.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-22T20:49:59+00:00",
"generator": {
"date": "2025-12-22T20:49:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:22790",
"initial_release_date": "2025-12-08T01:59:46+00:00",
"revision_history": [
{
"date": "2025-12-08T01:59:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-11T14:32:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-22T20:49:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.src",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.src",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el9_7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el9_7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el9_7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el9_7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el9_7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el9_7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el9_7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el9_7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el9_7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el9_7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.src",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"relates_to_product_reference": "AppStream-9.7.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Stanislav Fort",
"Aisle Research"
]
}
],
"cve": "CVE-2025-13502",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-21T07:47:33.751000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13502"
},
{
"category": "external",
"summary": "RHBZ#2416300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13502"
}
],
"release_date": "2025-11-25T07:59:40.140000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS"
},
{
"acknowledgments": [
{
"names": [
"Janet Black"
]
}
],
"cve": "CVE-2025-13947",
"discovery_date": "2025-12-03T08:57:27.767000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418576"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as High, as it enables remote websites to extract arbitrary files from a user\u2019s system with minimal interaction. Although some user action is required, the action can be trivial and easily induced by a malicious page. The issue arises from missing validation that a dragged file originated from an external application, enabling unintended file system access. Successful exploitation can compromise confidentiality of local user data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13947"
},
{
"category": "external",
"summary": "RHBZ#2418576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13947"
}
],
"release_date": "2025-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop"
},
{
"cve": "CVE-2025-43392",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:39:51.810000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416325"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate image data cross-origin due to improper handling of caches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A website may exfiltrate image data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43392"
},
{
"category": "external",
"summary": "RHBZ#2416325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43392",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43392"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A website may exfiltrate image data cross-origin"
},
{
"cve": "CVE-2025-43421",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T15:57:10.661000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416355"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause multiple issues in the JIT compiler and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43421"
},
{
"category": "external",
"summary": "RHBZ#2416355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43421"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43425",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:42:33.890000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416327"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43425"
},
{
"category": "external",
"summary": "RHBZ#2416327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43425"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43427",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:43:48.629000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416329"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43427"
},
{
"category": "external",
"summary": "RHBZ#2416329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43427"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43429",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-11-21T12:44:50.827000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper bounds checking and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43429"
},
{
"category": "external",
"summary": "RHBZ#2416330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43429"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43430",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:45:54.422000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416331"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43430"
},
{
"category": "external",
"summary": "RHBZ#2416331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43430"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43431",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-11-21T12:47:02.159000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416332"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43431"
},
{
"category": "external",
"summary": "RHBZ#2416332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43431",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43431"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43432",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:47:57.077000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416334"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43432"
},
{
"category": "external",
"summary": "RHBZ#2416334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43432"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43434",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:49:09.733000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43434"
},
{
"category": "external",
"summary": "RHBZ#2416335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43434"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-43440",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-21T12:50:27.289000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause JIT issues due to improper checks and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43440"
},
{
"category": "external",
"summary": "RHBZ#2416336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43440"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43443",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-21T12:51:26.005000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416337"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause JIT issues due to improper checks and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43443"
},
{
"category": "external",
"summary": "RHBZ#2416337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43443"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43458",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-12-04T16:02:08.461000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418855"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43458"
},
{
"category": "external",
"summary": "RHBZ#2418855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43458"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0009.html",
"url": "https://webkitgtk.org/security/WSA-2025-0009.html"
}
],
"release_date": "2025-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-66287",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-12-04T16:04:58.978000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418857"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66287"
},
{
"category": "external",
"summary": "RHBZ#2418857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66287"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0009.html",
"url": "https://webkitgtk.org/security/WSA-2025-0009.html"
}
],
"release_date": "2025-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:59:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.src",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-debugsource-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.50.3-1.el9_7.x86_64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.aarch64",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.i686",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.ppc64le",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.s390x",
"AppStream-9.7.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el9_7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
}
]
}
RHSA-2024:9680
Vulnerability from csaf_redhat - Published: 2024-11-14 15:24 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9680",
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9680.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:42+00:00",
"generator": {
"date": "2025-12-17T21:48:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9680",
"initial_release_date": "2024-11-14T15:24:51+00:00",
"revision_history": [
{
"date": "2024-11-14T15:24:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T15:24:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_2.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9680"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686",
"AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2025:22789
Vulnerability from csaf_redhat - Published: 2025-12-08 01:55 - Updated: 2025-12-22 20:49Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS (CVE-2025-13502)\n\n* webkitgtk: A website may exfiltrate image data cross-origin (CVE-2025-43392)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43425)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43427)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43429)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43430)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43431)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43432)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43434)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43440)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43443)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43421)\n\n* webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop (CVE-2025-13947)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43458)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-66287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:22789",
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2416300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"
},
{
"category": "external",
"summary": "2416325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325"
},
{
"category": "external",
"summary": "2416327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327"
},
{
"category": "external",
"summary": "2416329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329"
},
{
"category": "external",
"summary": "2416330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330"
},
{
"category": "external",
"summary": "2416331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331"
},
{
"category": "external",
"summary": "2416332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332"
},
{
"category": "external",
"summary": "2416334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334"
},
{
"category": "external",
"summary": "2416335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335"
},
{
"category": "external",
"summary": "2416336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336"
},
{
"category": "external",
"summary": "2416337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337"
},
{
"category": "external",
"summary": "2416355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355"
},
{
"category": "external",
"summary": "2418576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576"
},
{
"category": "external",
"summary": "2418855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855"
},
{
"category": "external",
"summary": "2418857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_22789.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-22T20:49:58+00:00",
"generator": {
"date": "2025-12-22T20:49:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2025:22789",
"initial_release_date": "2025-12-08T01:55:51+00:00",
"revision_history": [
{
"date": "2025-12-08T01:55:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-12-11T13:16:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-22T20:49:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.src",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.src",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.50.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.50.3-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Stanislav Fort",
"Aisle Research"
]
}
],
"cve": "CVE-2025-13502",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2025-11-21T07:47:33.751000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416300"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13502"
},
{
"category": "external",
"summary": "RHBZ#2416300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13502"
}
],
"release_date": "2025-11-25T07:59:40.140000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS"
},
{
"acknowledgments": [
{
"names": [
"Janet Black"
]
}
],
"cve": "CVE-2025-13947",
"discovery_date": "2025-12-03T08:57:27.767000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418576"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has assessed the severity of this vulnerability as High, as it enables remote websites to extract arbitrary files from a user\u2019s system with minimal interaction. Although some user action is required, the action can be trivial and easily induced by a malicious page. The issue arises from missing validation that a dragged file originated from an external application, enabling unintended file system access. Successful exploitation can compromise confidentiality of local user data.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13947"
},
{
"category": "external",
"summary": "RHBZ#2418576",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13947"
}
],
"release_date": "2025-12-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop"
},
{
"cve": "CVE-2025-43392",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:39:51.810000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416325"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate image data cross-origin due to improper handling of caches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A website may exfiltrate image data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43392"
},
{
"category": "external",
"summary": "RHBZ#2416325",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43392"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43392",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43392"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A website may exfiltrate image data cross-origin"
},
{
"cve": "CVE-2025-43421",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T15:57:10.661000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416355"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause multiple issues in the JIT compiler and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43421"
},
{
"category": "external",
"summary": "RHBZ#2416355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43421"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43425",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:42:33.890000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416327"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43425"
},
{
"category": "external",
"summary": "RHBZ#2416327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43425"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43427",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:43:48.629000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416329"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43427"
},
{
"category": "external",
"summary": "RHBZ#2416329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43427"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43427",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43427"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43429",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-11-21T12:44:50.827000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper bounds checking and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43429"
},
{
"category": "external",
"summary": "RHBZ#2416330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43429"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43429",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43429"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43430",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-11-21T12:45:54.422000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416331"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43430"
},
{
"category": "external",
"summary": "RHBZ#2416331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43430"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43430",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43430"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43431",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-11-21T12:47:02.159000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416332"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43431"
},
{
"category": "external",
"summary": "RHBZ#2416332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43431"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43431",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43431"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43432",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:47:57.077000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416334"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43432"
},
{
"category": "external",
"summary": "RHBZ#2416334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43432"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43432",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43432"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43434",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:49:09.733000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416335"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43434"
},
{
"category": "external",
"summary": "RHBZ#2416335",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43434"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-43440",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-21T12:50:27.289000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416336"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause JIT issues due to improper checks and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43440"
},
{
"category": "external",
"summary": "RHBZ#2416336",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43440"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43440",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43440"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43443",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-11-21T12:51:26.005000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416337"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause JIT issues due to improper checks and result in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43443"
},
{
"category": "external",
"summary": "RHBZ#2416337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43443"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43458",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-12-04T16:02:08.461000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418855"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43458"
},
{
"category": "external",
"summary": "RHBZ#2418855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43458"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43458",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43458"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0009.html",
"url": "https://webkitgtk.org/security/WSA-2025-0009.html"
}
],
"release_date": "2025-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-66287",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-12-04T16:04:58.978000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418857"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause an unexpected process crash but the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66287"
},
{
"category": "external",
"summary": "RHBZ#2418857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66287"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0009.html",
"url": "https://webkitgtk.org/security/WSA-2025-0009.html"
}
],
"release_date": "2025-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-12-08T01:55:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.50.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.50.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
}
]
}
RHSA-2024:8492
Vulnerability from csaf_redhat - Published: 2024-10-28 00:58 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:8492",
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8492.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:34+00:00",
"generator": {
"date": "2025-12-17T21:48:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:8492",
"initial_release_date": "2024-10-28T00:58:43+00:00",
"revision_history": [
{
"date": "2024-10-28T00:58:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-10-28T00:58:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.src",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.src",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-28T00:58:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:8492"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.src",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-debugsource-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_2.x86_64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.aarch64",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.i686",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.ppc64le",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.s390x",
"AppStream-9.2.0.Z.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:9636
Vulnerability from csaf_redhat - Published: 2024-11-14 10:17 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9636",
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9636.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:38+00:00",
"generator": {
"date": "2025-12-17T21:48:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9636",
"initial_release_date": "2024-11-14T10:17:10+00:00",
"revision_history": [
{
"date": "2024-11-14T10:17:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T10:17:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-42950",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271718"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: heap use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42950"
},
{
"category": "external",
"summary": "RHBZ#2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: heap use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23271",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2024-09-25T15:33:21.499000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23271"
},
{
"category": "external",
"summary": "RHBZ#2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27834",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282412"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: pointer authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27834"
},
{
"category": "external",
"summary": "RHBZ#2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0003.html",
"url": "https://webkitgtk.org/security/WSA-2024-0003.html"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: pointer authentication bypass"
},
{
"cve": "CVE-2024-27838",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-09-25T15:42:35.706000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314702"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27838"
},
{
"category": "external",
"summary": "RHBZ#2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-40866",
"discovery_date": "2024-09-17T00:31:06.549134+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2312724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40866"
},
{
"category": "external",
"summary": "RHBZ#2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121238",
"url": "https://support.apple.com/en-us/121238"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121241",
"url": "https://support.apple.com/en-us/121241"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-17T00:15:49.840000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44187",
"discovery_date": "2024-09-25T15:50:57.927000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314706"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44187"
},
{
"category": "external",
"summary": "RHBZ#2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44296",
"cwe": {
"id": "CWE-358",
"name": "Improperly Implemented Security Check for Standard"
},
"discovery_date": "2024-11-01T21:16:26.289000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323289"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44296"
},
{
"category": "external",
"summary": "RHBZ#2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44296"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-54658",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-02-11T16:12:08.426000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54658"
},
{
"category": "external",
"summary": "RHBZ#2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54658"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial-of-service"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T10:17:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9636"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
RHSA-2024:9653
Vulnerability from csaf_redhat - Published: 2024-11-14 12:21 - Updated: 2025-12-17 21:48Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9653",
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/",
"url": "https://access.redhat.com/security/vulnerabilities/"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9653.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-12-17T21:48:41+00:00",
"generator": {
"date": "2025-12-17T21:48:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2024:9653",
"initial_release_date": "2024-11-14T12:21:26+00:00",
"revision_history": [
{
"date": "2024-11-14T12:21:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T12:21:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-17T21:48:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-43000",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-11-21T12:36:58.206000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416324"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.\nAdditionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43000"
},
{
"category": "external",
"summary": "RHBZ#2416324",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43000"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2025-43480",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2025-11-21T12:52:14.645000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2416338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to trick a user into visiting a malicious website, potentially exposing sensitive information. Due to this reason, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-43480"
},
{
"category": "external",
"summary": "RHBZ#2416338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43480"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0008.html",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
}
],
"release_date": "2025-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
}
]
}
WID-SEC-W-2025-2657
Vulnerability from csaf_certbund - Published: 2025-11-20 23:00 - Updated: 2025-12-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "WebKitGTK ist ein Webbrowser. Dieser nutzt die WebKit-Engine, die auch von Safari und vielen anderen Apps auf macOS, iOS und Linux verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in WebKitGTK ausnutzen, um Memory Corruption, Prozessabst\u00fcrze (DoS) oder Cross-Origin-Datenexfiltration zu verursachen oder potentiell Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS\n- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2657 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2657.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2657 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2657"
},
{
"category": "external",
"summary": "WebKitGTK and WPE WebKit Security Advisory vom 2025-11-20",
"url": "https://webkitgtk.org/security/WSA-2025-0008.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-6F3E9E3AF6 vom 2025-11-23",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-6f3e9e3af6"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4394 vom 2025-12-04",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00005.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6070 vom 2025-12-04",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00236.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22790 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22790"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22789 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22789"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22790 vom 2025-12-09",
"url": "http://linux.oracle.com/errata/ELSA-2025-22790.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7914-1 vom 2025-12-08",
"url": "https://ubuntu.com/security/notices/USN-7914-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22789 vom 2025-12-09",
"url": "http://linux.oracle.com/errata/ELSA-2025-22789.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22790 vom 2025-12-09",
"url": "https://errata.build.resf.org/RLSA-2025:22790"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22789 vom 2025-12-09",
"url": "https://errata.build.resf.org/RLSA-2025:22789"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4416-1 vom 2025-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23451 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23434 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23434"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23433 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23452 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23452"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4423-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23591 vom 2025-12-18",
"url": "https://access.redhat.com/errata/RHSA-2025:23591"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23583 vom 2025-12-18",
"url": "https://access.redhat.com/errata/RHSA-2025:23583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23742 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23742"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23743 vom 2025-12-22",
"url": "https://access.redhat.com/errata/RHSA-2025:23743"
}
],
"source_lang": "en-US",
"title": "WebKitGTK: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-12-21T23:00:00.000+00:00",
"generator": {
"date": "2025-12-22T08:55:00.422+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2657",
"initial_release_date": "2025-11-20T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-20T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.50.2",
"product": {
"name": "Open Source WebKitGTK \u003c2.50.2",
"product_id": "T048823"
}
},
{
"category": "product_version",
"name": "2.50.2",
"product": {
"name": "Open Source WebKitGTK 2.50.2",
"product_id": "T048823-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:webkitgtk:webkitgtk:2.50.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2.51.2",
"product": {
"name": "Open Source WebKitGTK \u003c2.51.2",
"product_id": "T048825"
}
},
{
"category": "product_version",
"name": "2.51.2",
"product": {
"name": "Open Source WebKitGTK 2.51.2",
"product_id": "T048825-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:webkitgtk:webkitgtk:2.51.2"
}
}
}
],
"category": "product_name",
"name": "WebKitGTK"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43000",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2023-43000"
},
{
"cve": "CVE-2025-43392",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43419",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43419"
},
{
"cve": "CVE-2025-43425",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43427",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43434",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43440",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43443",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43480",
"product_status": {
"known_affected": [
"T048825",
"T048823",
"2951",
"T002207",
"67646",
"T000126",
"T004914",
"T032255",
"74185"
]
},
"release_date": "2025-11-20T23:00:00.000+00:00",
"title": "CVE-2025-43480"
}
]
}
FKIE_CVE-2025-43480
Vulnerability from fkie_nvd - Published: 2025-11-04 02:15 - Updated: 2025-12-17 21:16| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://support.apple.com/en-us/125632 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125634 | ||
| product-security@apple.com | https://support.apple.com/en-us/125637 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125638 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125639 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/125640 | Release Notes, Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFF118CE-3F13-43BE-B250-5579E1C842EB",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D51AEDC-9086-4010-B3BF-C652D65D09C8",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3981A7BE-BC98-4C6F-AE38-D68839368925",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "290E0D29-CB5B-45A7-9FE3-FD2030B1D1A4",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DFD3616-65CA-4E5C-849C-3C20ACBCB610",
"versionEndExcluding": "26.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9D7F76-13FB-407C-94E5-221B93021568",
"versionEndExcluding": "26.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in tvOS 26.1, watchOS 26.1, macOS Tahoe 26.1, iOS 26.1 and iPadOS 26.1, Safari 26.1, visionOS 26.1. A malicious website may exfiltrate data cross-origin."
}
],
"id": "CVE-2025-43480",
"lastModified": "2025-12-17T21:16:07.700",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-11-04T02:15:52.400",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125632"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/125634"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125637"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125638"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125639"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/125640"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-942"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
NCSC-2025-0352
Vulnerability from csaf_ncscnl - Published: 2025-11-04 12:53 - Updated: 2025-11-04 12:53Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in iOS 26.1 en iPadOS 26.1.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden betroffen verschillende privacy- en beveiligingsproblemen, waaronder ongeautoriseerde toegang tot gebruikersgegevens, het risico van gegevensexfiltratie, en kwetsbaarheden in geheugenbeheer die konden leiden tot onverwachte systeemcrashes. Aanvallers konden mogelijk gevoelige informatie verkrijgen via misbruik van deze kwetsbaarheden, wat de integriteit en privacy van gebruikers in gevaar bracht. De updates bevatten verbeterde validatiemechanismen en restricties om deze risico\u0027s te mitigeren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "medium",
"title": "Schade"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "CWE-371",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125632"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2025-11-04T12:53:15.358078Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0352",
"initial_release_date": "2025-11-04T12:53:15.358078Z",
"revision_history": [
{
"date": "2025-11-04T12:53:15.358078Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-43442",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 addressed a permissions issue that allowed apps to identify other installed apps by implementing additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43442 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43442.json"
}
],
"title": "CVE-2025-43442"
},
{
"cve": "CVE-2025-43455",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy vulnerability that could allow malicious apps to capture sensitive information via screenshots through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43455 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43455.json"
}
],
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43447",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43447 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43447.json"
}
],
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43462",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43462 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43462.json"
}
],
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43449",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved the issue of malicious apps tracking users between installs through enhanced cache handling mechanisms.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43449 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43449.json"
}
],
"title": "CVE-2025-43449"
},
{
"cve": "CVE-2025-43379",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and various macOS, watchOS, iOS, iPadOS, and tvOS versions have enhanced symlink validation to prevent unauthorized access to protected user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43379 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43379.json"
}
],
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43407",
"notes": [
{
"category": "description",
"text": "Recent updates to visionOS 26.1 and various macOS, iOS, and tvOS versions have resolved the issue of apps potentially breaking out of their sandbox through improved entitlements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43407 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43407.json"
}
],
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43423",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, and visionOS 26.1 have resolved a logging issue that exposed sensitive user information through enhanced data redaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43423 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43423.json"
}
],
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43450",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 addressed a logic issue that previously allowed apps to access camera views before permission was granted, enhancing security checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43450 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43450.json"
}
],
"title": "CVE-2025-43450"
},
{
"cve": "CVE-2025-43448",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved symlink vulnerabilities through enhanced validation, preventing potential sandbox breaches by applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43448 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43448.json"
}
],
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43426",
"notes": [
{
"category": "description",
"text": "A logging issue affecting sensitive user data was resolved in iOS 26.1 and iPadOS 26.1 through enhanced data redaction measures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43426 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43426.json"
}
],
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43350",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved a permissions issue that previously allowed unauthorized access to restricted content from the lock screen through enhanced restrictions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43350 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43350.json"
}
],
"title": "CVE-2025-43350"
},
{
"cve": "CVE-2025-43436",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing app enumeration of installed applications has been resolved with enhanced restrictions in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43436 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43436.json"
}
],
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43445",
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was mitigated through enhanced input validation, impacting multiple operating systems and potentially causing application crashes or memory corruption when handling malicious media files.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43445 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43445.json"
}
],
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43498",
"notes": [
{
"category": "description",
"text": "An authorization issue concerning sensitive user data access has been resolved through enhanced state management in iOS 26.1 and macOS Sequoia 15.7.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43498 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43498.json"
}
],
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43507",
"notes": [
{
"category": "description",
"text": "A privacy issue related to user fingerprinting was resolved in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 by relocating sensitive data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43507 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43507.json"
}
],
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-43444",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved a permissions issue that could allow apps to fingerprint users through enhanced restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43444 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43444.json"
}
],
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43398",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved unexpected system termination issues caused by memory handling through improved memory management techniques.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43398 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43398.json"
}
],
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43413",
"notes": [
{
"category": "description",
"text": "An access issue related to sandbox restrictions has been resolved in visionOS 26.1 and macOS Sonoma 14.8.2, enabling sandboxed apps to observe system-wide network connections through additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43413 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43413.json"
}
],
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43496",
"notes": [
{
"category": "description",
"text": "The issue of remote content loading despite the \u0027Load Remote Images\u0027 setting being off has been resolved in watchOS 26.1 and iOS 26.1 through the implementation of additional logic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43496 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43496.json"
}
],
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43294",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "The handling of environment variables issue, which posed a risk of unauthorized access to sensitive user data, has been resolved through enhanced validation in watchOS 26.1, iOS 26.1, iPadOS 26.1, and tvOS 26.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43294 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43294.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43386",
"notes": [
{
"category": "description",
"text": "iOS 26.1 addressed an out-of-bounds access vulnerability that could lead to app crashes or memory corruption when handling malicious media files, with improved bounds checking implemented.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43386 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43386.json"
}
],
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43385",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43385 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43385.json"
}
],
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43384",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43384 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43384.json"
}
],
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43383",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43383.json"
}
],
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43424",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved a potential process crash vulnerability caused by a malicious HID device through the implementation of improved bounds checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43424.json"
}
],
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43389",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability in iOS 26.1 and macOS Sequoia 15.7.2 was resolved by removing code that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43389 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43389.json"
}
],
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43439",
"notes": [
{
"category": "description",
"text": "Recent updates in iOS 26.1, iPadOS 26.1, and visionOS 26.1 addressed a privacy issue by eliminating sensitive data that could facilitate user fingerprinting.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43439 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43439.json"
}
],
"title": "CVE-2025-43439"
},
{
"cve": "CVE-2025-43391",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sonoma 14.8.2, and macOS Sequoia 15.7.2 have resolved a privacy issue related to the handling of temporary files that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43391 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43391.json"
}
],
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43493",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 have resolved the address bar spoofing issue through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43493 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43493.json"
}
],
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43503",
"notes": [
{
"category": "description",
"text": "An inconsistent user interface issue related to state management has been resolved across multiple operating systems, including watchOS, iOS, iPadOS, Safari, and visionOS, addressing potential spoofing risks from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43503 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43503.json"
}
],
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43502",
"notes": [
{
"category": "description",
"text": "Recent updates in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 addressed a privacy issue by removing sensitive data to prevent the bypassing of privacy preferences.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43502 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43502.json"
}
],
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43500",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy issue regarding user preferences, enhancing the protection of sensitive user data from app access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43500 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43500.json"
}
],
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43454",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 resolve device locking failures and improve bounds checks, enhancing overall system stability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43454 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43454.json"
}
],
"title": "CVE-2025-43454"
},
{
"cve": "CVE-2025-43460",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have addressed a logic issue that allowed physical access to a locked device, enabling the viewing of sensitive user information, through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43460 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43460.json"
}
],
"title": "CVE-2025-43460"
},
{
"cve": "CVE-2025-43422",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have addressed a vulnerability in Stolen Device Protection that could be exploited by an attacker with physical access, through the implementation of additional logic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43422 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43422.json"
}
],
"title": "CVE-2025-43422"
},
{
"cve": "CVE-2025-43452",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved the issue of keyboard suggestions displaying sensitive information on the lock screen by implementing restrictions on options available on locked devices.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43452 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43452.json"
}
],
"title": "CVE-2025-43452"
},
{
"cve": "CVE-2025-43480",
"notes": [
{
"category": "description",
"text": "Apple has resolved a data exfiltration issue in Safari and iOS through enhanced checks to prevent potential threats from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43480 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43480.json"
}
],
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43458",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43458 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43458.json"
}
],
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43430",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43430 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43430.json"
}
],
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43427",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have resolved unexpected process crashes caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43427.json"
}
],
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43443",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43443 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43443.json"
}
],
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43441",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have addressed unexpected process crashes caused by malicious web content through enhanced memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43441 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43441.json"
}
],
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43435",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43435.json"
}
],
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43425",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43425.json"
}
],
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43440",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43440 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43440.json"
}
],
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43438",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43438 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43438.json"
}
],
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43457",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43457 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43457.json"
}
],
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43434",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43434.json"
}
],
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43495",
"notes": [
{
"category": "description",
"text": "The issue of unauthorized keystroke monitoring has been addressed in iOS 26.1 and iPadOS 26.1 through the implementation of improved checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43495 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43495.json"
}
],
"title": "CVE-2025-43495"
},
{
"cve": "CVE-2025-43433",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43433.json"
}
],
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43431",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43431 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43431.json"
}
],
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in various Apple operating systems was resolved through improved memory management, mitigating risks from potentially malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43432.json"
}
],
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43429",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was addressed in Safari and various Apple operating systems, including visionOS, watchOS, iOS, iPadOS, and tvOS versions 26.1, through enhanced bounds checking to prevent unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43429 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43429.json"
}
],
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43421",
"notes": [
{
"category": "description",
"text": "Disabling array allocation sinking has resolved vulnerabilities in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1, preventing unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43421 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43421.json"
}
],
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43392",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and related operating systems have resolved cross-origin image data exfiltration issues through improved cache handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43392.json"
}
],
"title": "CVE-2025-43392"
}
]
}
NCSC-2025-0351
Vulnerability from csaf_ncscnl - Published: 2025-11-04 12:44 - Updated: 2025-11-04 12:44Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2 en MacOS Tahoe 26.1.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten een breed scala aan problemen, waaronder ongeautoriseerde toegang tot gevoelige gebruikersdata, racecondities, en logische fouten die konden leiden tot ongewenste toegang of systeeminstabiliteit. Aanvallers konden deze kwetsbaarheden misbruiken door gebruik te maken van onjuiste validatieprocessen en beveiligingslekken in de sandbox-omgeving. De impact varieerde van gegevenslekken tot potenti\u00eble systeemcrashes, wat de noodzaak van onmiddellijke aandacht benadrukte.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen, waaronder verbeterde validatieprocessen, extra restricties in de sandbox-omgeving, en verbeteringen in het geheugenbeheer. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CWE-265",
"title": "CWE-265"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125634"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125635"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125636"
}
],
"title": "Kwetsbaarheden verholpen in Apple MacOS",
"tracking": {
"current_release_date": "2025-11-04T12:44:25.439757Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0351",
"initial_release_date": "2025-11-04T12:44:25.439757Z",
"revision_history": [
{
"date": "2025-11-04T12:44:25.439757Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Mac OS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "macOS Sequoia"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "macOS Sonoma"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "macOS Tahoe"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-43398",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "description",
"text": "The REXML gem has multiple denial of service vulnerabilities, particularly affecting versions prior to 3.3.6, with updates addressing these issues in version 3.3.9.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43398 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-43398.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2024-43398"
},
{
"cve": "CVE-2024-49761",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "description",
"text": "REXML gem versions prior to 3.3.9 have a ReDoS vulnerability affecting Ruby 3.1 and earlier, with patches available in newer versions, while ruby2.5 also addresses related vulnerabilities in WEBrick and URI handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49761 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-49761.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2024-49761"
},
{
"cve": "CVE-2025-6442",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "The Ruby WEBrick read_header HTTP Request Smuggling Vulnerability (CVE-2025-6442) allows remote attackers to exploit affected installations behind specific HTTP proxies, alongside userinfo leakage issues (CVE-2025-27221).",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6442 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-6442"
},
{
"cve": "CVE-2025-30465",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "description",
"text": "A permissions issue in macOS and iPadOS that allowed shortcuts to access restricted files has been resolved through enhanced validation measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-30465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-30465.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-30465"
},
{
"cve": "CVE-2025-31199",
"cwe": {
"id": "CWE-532",
"name": "Insertion of Sensitive Information into Log File"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "description",
"text": "A logging issue allowing app access to sensitive user data has been resolved through enhanced data redaction in iOS 18.4, iPadOS 18.4, visionOS 2.4, and macOS Sequoia 15.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31199 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-31199"
},
{
"cve": "CVE-2025-32462",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "description",
"text": "A privilege escalation vulnerability in Sudo affects versions 1.8.8 to 1.9.17, allowing unauthorized users to gain elevated privileges through misconfigured sudoers files, particularly in shared environments.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32462 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32462.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-32462"
},
{
"cve": "CVE-2025-43292",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "description",
"text": "macOS Sequoia 15.7 and 15.7.2 have addressed a race condition that could allow unauthorized access to sensitive user data through enhanced state handling mechanisms.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43292 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43292.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43322",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a logic issue that could allow unauthorized access to user-sensitive data through enhanced checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43322 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43322.json"
}
],
"title": "CVE-2025-43322"
},
{
"cve": "CVE-2025-43334",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved unauthorized access to user-sensitive data through the implementation of additional entitlement checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43334 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43334.json"
}
],
"title": "CVE-2025-43334"
},
{
"cve": "CVE-2025-43335",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved unauthorized access to user-sensitive data by implementing additional logic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43335 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43335.json"
}
],
"title": "CVE-2025-43335"
},
{
"cve": "CVE-2025-43336",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a permissions issue that allowed root-privileged apps to access private information through additional restrictions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43336 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43336.json"
}
],
"title": "CVE-2025-43336"
},
{
"cve": "CVE-2025-43337",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "macOS Sequoia 15.7.2 has addressed an access issue related to sensitive user data by implementing additional sandbox restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43337 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43338",
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability affecting macOS Sonoma 14.8.2, iOS 26, and iPadOS 26 was fixed, which could lead to unexpected app termination or memory corruption when handling malicious media files.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43338 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43338.json"
}
],
"title": "CVE-2025-43338"
},
{
"cve": "CVE-2025-43348",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a logic issue that allowed apps to bypass Gatekeeper checks through improved validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43348 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43348.json"
}
],
"title": "CVE-2025-43348"
},
{
"cve": "CVE-2025-43351",
"notes": [
{
"category": "description",
"text": "A permissions issue was addressed through the implementation of additional restrictions to enhance security controls.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43351 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43351.json"
}
],
"title": "CVE-2025-43351"
},
{
"cve": "CVE-2025-43361",
"notes": [
{
"category": "description",
"text": "Apple has addressed an out-of-bounds read vulnerability in multiple operating systems through enhanced bounds checking, preventing potential access to kernel memory by malicious applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43361 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43361.json"
}
],
"title": "CVE-2025-43361"
},
{
"cve": "CVE-2025-43364",
"notes": [
{
"category": "description",
"text": "A race condition that could allow an application to escape its sandbox has been addressed in macOS Sonoma 14.8 and macOS Sequoia 15.7 through enhanced validation measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43364 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43364.json"
}
],
"title": "CVE-2025-43364"
},
{
"cve": "CVE-2025-43372",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "description",
"text": "Recent updates in tvOS 26 and iOS 26 have addressed a vulnerability related to potential app termination or memory corruption caused by malicious media files through enhanced input validation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43372 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43372.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-43372"
},
{
"cve": "CVE-2025-43373",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed issues related to unexpected system termination and kernel memory corruption through improved memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43373.json"
}
],
"title": "CVE-2025-43373"
},
{
"cve": "CVE-2025-43377",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 addressed an out-of-bounds read vulnerability through enhanced bounds checking, which could lead to potential denial-of-service by an application.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43377 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43377.json"
}
],
"title": "CVE-2025-43377"
},
{
"cve": "CVE-2025-43378",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 has resolved a permissions issue that previously allowed unauthorized access to sensitive user data by implementing additional restrictions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43378 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43378.json"
}
],
"title": "CVE-2025-43378"
},
{
"cve": "CVE-2025-43379",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and various macOS, watchOS, iOS, iPadOS, and tvOS versions have enhanced symlink validation to prevent unauthorized access to protected user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43379 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43379.json"
}
],
"title": "CVE-2025-43379"
},
{
"cve": "CVE-2025-43380",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed an out-of-bounds write vulnerability that could lead to unexpected application termination through improved input validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43380 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43380.json"
}
],
"title": "CVE-2025-43380"
},
{
"cve": "CVE-2025-43381",
"notes": [
{
"category": "description",
"text": "The issue was addressed by improving the management of symlinks to enhance system integrity and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43381 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43381.json"
}
],
"title": "CVE-2025-43381"
},
{
"cve": "CVE-2025-43382",
"notes": [
{
"category": "description",
"text": "Recent updates in macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 addressed a parsing issue in directory path handling, enhancing path validation to prevent potential unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43382 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43382.json"
}
],
"title": "CVE-2025-43382"
},
{
"cve": "CVE-2025-43383",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43383 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43383.json"
}
],
"title": "CVE-2025-43383"
},
{
"cve": "CVE-2025-43384",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43384 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43384.json"
}
],
"title": "CVE-2025-43384"
},
{
"cve": "CVE-2025-43385",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems addressed an out-of-bounds access issue that could lead to unexpected app termination or memory corruption when handling malicious media files through improved bounds checking.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43385 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43385.json"
}
],
"title": "CVE-2025-43385"
},
{
"cve": "CVE-2025-43386",
"notes": [
{
"category": "description",
"text": "iOS 26.1 addressed an out-of-bounds access vulnerability that could lead to app crashes or memory corruption when handling malicious media files, with improved bounds checking implemented.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43386 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43386.json"
}
],
"title": "CVE-2025-43386"
},
{
"cve": "CVE-2025-43387",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 has addressed a permissions issue that could allow malicious applications to gain root privileges through the implementation of additional restrictions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43387 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43387.json"
}
],
"title": "CVE-2025-43387"
},
{
"cve": "CVE-2025-43388",
"notes": [
{
"category": "description",
"text": "An injection vulnerability was effectively mitigated through the implementation of enhanced validation measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43388 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43388.json"
}
],
"title": "CVE-2025-43388"
},
{
"cve": "CVE-2025-43389",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability in iOS 26.1 and macOS Sequoia 15.7.2 was resolved by removing code that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43389 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43389.json"
}
],
"title": "CVE-2025-43389"
},
{
"cve": "CVE-2025-43390",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 resolves a downgrade issue on Intel-based Mac computers by implementing enhanced code-signing restrictions to protect user-sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43390 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43390.json"
}
],
"title": "CVE-2025-43390"
},
{
"cve": "CVE-2025-43391",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sonoma 14.8.2, and macOS Sequoia 15.7.2 have resolved a privacy issue related to the handling of temporary files that could have allowed unauthorized access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43391 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43391.json"
}
],
"title": "CVE-2025-43391"
},
{
"cve": "CVE-2025-43392",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and related operating systems have resolved cross-origin image data exfiltration issues through improved cache handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43392 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43392.json"
}
],
"title": "CVE-2025-43392"
},
{
"cve": "CVE-2025-43393",
"notes": [
{
"category": "description",
"text": "A permissions issue was addressed by enhancing restrictions within the sandbox environment to improve security controls.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43393 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43393.json"
}
],
"title": "CVE-2025-43393"
},
{
"cve": "CVE-2025-43394",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved an issue related to the handling of symlinks that previously allowed applications to access protected user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43394 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43394.json"
}
],
"title": "CVE-2025-43394"
},
{
"cve": "CVE-2025-43395",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved an issue related to the handling of symlinks that previously allowed applications to access protected user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43395 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43395.json"
}
],
"title": "CVE-2025-43395"
},
{
"cve": "CVE-2025-43396",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a logic issue that could allow sandboxed apps to access sensitive user data through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43396 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43396.json"
}
],
"title": "CVE-2025-43396"
},
{
"cve": "CVE-2025-43397",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 addressed a permissions vulnerability that could lead to denial-of-service by removing the associated vulnerable code.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43397 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43397.json"
}
],
"title": "CVE-2025-43397"
},
{
"cve": "CVE-2025-43398",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved unexpected system termination issues caused by memory handling through improved memory management techniques.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43398 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43398.json"
}
],
"title": "CVE-2025-43398"
},
{
"cve": "CVE-2025-43399",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 has addressed unauthorized access to protected user data through enhanced redaction measures, significantly reducing the risk of sensitive information exposure.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43399.json"
}
],
"title": "CVE-2025-43399"
},
{
"cve": "CVE-2025-43401",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 addressed a denial-of-service vulnerability through enhanced validation, preventing potential exploitation by remote attackers.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43401 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43401.json"
}
],
"title": "CVE-2025-43401"
},
{
"cve": "CVE-2025-43402",
"notes": [
{
"category": "description",
"text": "The issue was addressed through improvements in memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43402 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43402.json"
}
],
"title": "CVE-2025-43402"
},
{
"cve": "CVE-2025-43404",
"notes": [
{
"category": "description",
"text": "A permissions issue was addressed by enhancing restrictions within the sandbox environment to improve security controls.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43404 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43404.json"
}
],
"title": "CVE-2025-43404"
},
{
"cve": "CVE-2025-43405",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 addressed a permissions issue related to user-sensitive data through enhanced sandbox restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43405 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43405.json"
}
],
"title": "CVE-2025-43405"
},
{
"cve": "CVE-2025-43406",
"notes": [
{
"category": "description",
"text": "A logic issue was resolved through the implementation of enhanced restrictions, improving system integrity and security.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43406 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43406.json"
}
],
"title": "CVE-2025-43406"
},
{
"cve": "CVE-2025-43407",
"notes": [
{
"category": "description",
"text": "Recent updates to visionOS 26.1 and various macOS, iOS, and tvOS versions have resolved the issue of apps potentially breaking out of their sandbox through improved entitlements.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43407 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43407.json"
}
],
"title": "CVE-2025-43407"
},
{
"cve": "CVE-2025-43408",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved unauthorized access to contacts from the lock screen by restricting available options, enhancing device security.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43408 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43408.json"
}
],
"title": "CVE-2025-43408"
},
{
"cve": "CVE-2025-43409",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 addressed a permissions issue that allowed applications to access sensitive user data by implementing additional sandbox restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43409 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43409.json"
}
],
"title": "CVE-2025-43409"
},
{
"cve": "CVE-2025-43411",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved unauthorized access to user-sensitive data through the implementation of additional entitlement checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43411 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43411.json"
}
],
"title": "CVE-2025-43411"
},
{
"cve": "CVE-2025-43412",
"notes": [
{
"category": "description",
"text": "The file quarantine bypass issue, which allowed applications to escape their sandbox, has been resolved in macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 through the implementation of additional checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43412 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43412.json"
}
],
"title": "CVE-2025-43412"
},
{
"cve": "CVE-2025-43413",
"notes": [
{
"category": "description",
"text": "An access issue related to sandbox restrictions has been resolved in visionOS 26.1 and macOS Sonoma 14.8.2, enabling sandboxed apps to observe system-wide network connections through additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43413 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43413.json"
}
],
"title": "CVE-2025-43413"
},
{
"cve": "CVE-2025-43414",
"notes": [
{
"category": "description",
"text": "Recent updates in macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 addressed a permissions issue through enhanced validation, potentially allowing shortcuts to access restricted files.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43414 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43414.json"
}
],
"title": "CVE-2025-43414"
},
{
"cve": "CVE-2025-43420",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability was resolved in macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2, enhancing state handling to prevent unauthorized access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43420 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43420.json"
}
],
"title": "CVE-2025-43420"
},
{
"cve": "CVE-2025-43421",
"notes": [
{
"category": "description",
"text": "Disabling array allocation sinking has resolved vulnerabilities in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1, preventing unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43421 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43421.json"
}
],
"title": "CVE-2025-43421"
},
{
"cve": "CVE-2025-43423",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, macOS Sequoia 15.7.2, and visionOS 26.1 have resolved a logging issue that exposed sensitive user information through enhanced data redaction.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43423 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43423.json"
}
],
"title": "CVE-2025-43423"
},
{
"cve": "CVE-2025-43424",
"notes": [
{
"category": "description",
"text": "iOS 26.1 and iPadOS 26.1 have resolved a potential process crash vulnerability caused by a malicious HID device through the implementation of improved bounds checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43424 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43424.json"
}
],
"title": "CVE-2025-43424"
},
{
"cve": "CVE-2025-43425",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43425.json"
}
],
"title": "CVE-2025-43425"
},
{
"cve": "CVE-2025-43426",
"notes": [
{
"category": "description",
"text": "A logging issue affecting sensitive user data was resolved in iOS 26.1 and iPadOS 26.1 through enhanced data redaction measures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43426 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43426.json"
}
],
"title": "CVE-2025-43426"
},
{
"cve": "CVE-2025-43427",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have resolved unexpected process crashes caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43427 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43427.json"
}
],
"title": "CVE-2025-43427"
},
{
"cve": "CVE-2025-43429",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was addressed in Safari and various Apple operating systems, including visionOS, watchOS, iOS, iPadOS, and tvOS versions 26.1, through enhanced bounds checking to prevent unexpected process crashes from malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43429 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43429.json"
}
],
"title": "CVE-2025-43429"
},
{
"cve": "CVE-2025-43430",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43430 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43430.json"
}
],
"title": "CVE-2025-43430"
},
{
"cve": "CVE-2025-43431",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43431 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43431.json"
}
],
"title": "CVE-2025-43431"
},
{
"cve": "CVE-2025-43432",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in various Apple operating systems was resolved through improved memory management, mitigating risks from potentially malicious web content.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43432 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43432.json"
}
],
"title": "CVE-2025-43432"
},
{
"cve": "CVE-2025-43433",
"notes": [
{
"category": "description",
"text": "Apple has addressed memory corruption vulnerabilities in Safari and iOS 26.1 through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43433 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43433.json"
}
],
"title": "CVE-2025-43433"
},
{
"cve": "CVE-2025-43434",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43434 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43434.json"
}
],
"title": "CVE-2025-43434"
},
{
"cve": "CVE-2025-43435",
"notes": [
{
"category": "description",
"text": "Apple has addressed the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced memory management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43435 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43435.json"
}
],
"title": "CVE-2025-43435"
},
{
"cve": "CVE-2025-43436",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing app enumeration of installed applications has been resolved with enhanced restrictions in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43436 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43436.json"
}
],
"title": "CVE-2025-43436"
},
{
"cve": "CVE-2025-43438",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43438 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43438.json"
}
],
"title": "CVE-2025-43438"
},
{
"cve": "CVE-2025-43440",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43440 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43440.json"
}
],
"title": "CVE-2025-43440"
},
{
"cve": "CVE-2025-43441",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, tvOS 26.1, Safari 26.1, and visionOS 26.1 have addressed unexpected process crashes caused by malicious web content through enhanced memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43441 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43441.json"
}
],
"title": "CVE-2025-43441"
},
{
"cve": "CVE-2025-43443",
"notes": [
{
"category": "description",
"text": "Safari 26.1 and various Apple operating systems have resolved unexpected process crashes caused by malicious web content through enhanced checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43443 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43443.json"
}
],
"title": "CVE-2025-43443"
},
{
"cve": "CVE-2025-43444",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved a permissions issue that could allow apps to fingerprint users through enhanced restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43444 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43444.json"
}
],
"title": "CVE-2025-43444"
},
{
"cve": "CVE-2025-43445",
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability was mitigated through enhanced input validation, impacting multiple operating systems and potentially causing application crashes or memory corruption when handling malicious media files.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43445 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43445.json"
}
],
"title": "CVE-2025-43445"
},
{
"cve": "CVE-2025-43446",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved the issue of apps modifying protected file system areas through enhanced symlink validation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43446 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43446.json"
}
],
"title": "CVE-2025-43446"
},
{
"cve": "CVE-2025-43447",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43447 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43447.json"
}
],
"title": "CVE-2025-43447"
},
{
"cve": "CVE-2025-43448",
"notes": [
{
"category": "description",
"text": "Recent updates in visionOS 26.1 and macOS Sonoma 14.8.2 have resolved symlink vulnerabilities through enhanced validation, preventing potential sandbox breaches by applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43448 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43448.json"
}
],
"title": "CVE-2025-43448"
},
{
"cve": "CVE-2025-43455",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy vulnerability that could allow malicious apps to capture sensitive information via screenshots through enhanced checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43455 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43455.json"
}
],
"title": "CVE-2025-43455"
},
{
"cve": "CVE-2025-43457",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability affecting Safari and various Apple operating systems was addressed through improved memory management in the latest updates.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43457 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43457.json"
}
],
"title": "CVE-2025-43457"
},
{
"cve": "CVE-2025-43458",
"notes": [
{
"category": "description",
"text": "Apple has resolved the issue of unexpected process crashes in Safari and iOS caused by malicious web content through enhanced state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43458 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43458.json"
}
],
"title": "CVE-2025-43458"
},
{
"cve": "CVE-2025-43461",
"notes": [
{
"category": "description",
"text": "The issue was addressed by improving the symlink validation process to enhance security measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43461 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43461.json"
}
],
"title": "CVE-2025-43461"
},
{
"cve": "CVE-2025-43462",
"notes": [
{
"category": "description",
"text": "The recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, tvOS 26.1, and visionOS 26.1 have resolved issues related to unexpected system termination and kernel memory corruption through enhanced memory handling.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43462 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43462.json"
}
],
"title": "CVE-2025-43462"
},
{
"cve": "CVE-2025-43463",
"notes": [
{
"category": "description",
"text": "A parsing issue concerning directory paths was effectively addressed through improved path validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43463 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43463.json"
}
],
"title": "CVE-2025-43463"
},
{
"cve": "CVE-2025-43464",
"notes": [
{
"category": "description",
"text": "A denial-of-service vulnerability was addressed through improved input validation techniques, enhancing the overall security posture.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43464 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43464.json"
}
],
"title": "CVE-2025-43464"
},
{
"cve": "CVE-2025-43465",
"notes": [
{
"category": "description",
"text": "A parsing issue concerning directory paths was effectively addressed through improved path validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43465 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43465.json"
}
],
"title": "CVE-2025-43465"
},
{
"cve": "CVE-2025-43466",
"notes": [
{
"category": "description",
"text": "An injection vulnerability was effectively mitigated through the implementation of enhanced validation measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43466 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43466.json"
}
],
"title": "CVE-2025-43466"
},
{
"cve": "CVE-2025-43467",
"notes": [
{
"category": "description",
"text": "The issue was resolved through the implementation of enhanced checks, ensuring improved security measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43467 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43467.json"
}
],
"title": "CVE-2025-43467"
},
{
"cve": "CVE-2025-43468",
"notes": [
{
"category": "description",
"text": "New code-signing restrictions in macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved a downgrade issue on Intel-based Mac computers that previously allowed unauthorized access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43468 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43468.json"
}
],
"title": "CVE-2025-43468"
},
{
"cve": "CVE-2025-43469",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a permissions issue that previously allowed applications to access sensitive user data by implementing additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43469 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43469.json"
}
],
"title": "CVE-2025-43469"
},
{
"cve": "CVE-2025-43471",
"notes": [
{
"category": "description",
"text": "The issue was resolved through the implementation of enhanced checks, ensuring improved security measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43471 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43471.json"
}
],
"title": "CVE-2025-43471"
},
{
"cve": "CVE-2025-43472",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a validation issue related to input sanitization that could have allowed applications to gain root privileges.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43472 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43472.json"
}
],
"title": "CVE-2025-43472"
},
{
"cve": "CVE-2025-43473",
"notes": [
{
"category": "description",
"text": "The issue was effectively resolved through the implementation of enhanced state management techniques.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43473 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43473.json"
}
],
"title": "CVE-2025-43473"
},
{
"cve": "CVE-2025-43474",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved an out-of-bounds read issue that could lead to system termination or unauthorized kernel memory access through enhanced input validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43474 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43474.json"
}
],
"title": "CVE-2025-43474"
},
{
"cve": "CVE-2025-43476",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a permissions issue that could allow an app to escape its sandbox through the implementation of additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43476 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43476.json"
}
],
"title": "CVE-2025-43476"
},
{
"cve": "CVE-2025-43477",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved a privacy issue concerning sensitive user data access through enhanced private data redaction for both user data and log entries.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43477 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43477.json"
}
],
"title": "CVE-2025-43477"
},
{
"cve": "CVE-2025-43478",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a use after free issue related to memory management, preventing unexpected app-related system terminations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43478 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43478.json"
}
],
"title": "CVE-2025-43478"
},
{
"cve": "CVE-2025-43479",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have addressed a permissions issue that previously allowed applications to access sensitive user data by implementing additional restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43479 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43479.json"
}
],
"title": "CVE-2025-43479"
},
{
"cve": "CVE-2025-43480",
"notes": [
{
"category": "description",
"text": "Apple has resolved a data exfiltration issue in Safari and iOS through enhanced checks to prevent potential threats from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43480 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43480.json"
}
],
"title": "CVE-2025-43480"
},
{
"cve": "CVE-2025-43481",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.2 has resolved the issue of applications potentially escaping their sandbox through enhanced verification measures.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43481 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43481.json"
}
],
"title": "CVE-2025-43481"
},
{
"cve": "CVE-2025-43493",
"notes": [
{
"category": "description",
"text": "iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 have resolved the address bar spoofing issue through enhanced verification measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43493 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43493.json"
}
],
"title": "CVE-2025-43493"
},
{
"cve": "CVE-2025-43496",
"notes": [
{
"category": "description",
"text": "The issue of remote content loading despite the \u0027Load Remote Images\u0027 setting being off has been resolved in watchOS 26.1 and iOS 26.1 through the implementation of additional logic.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43496 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43496.json"
}
],
"title": "CVE-2025-43496"
},
{
"cve": "CVE-2025-43497",
"notes": [
{
"category": "description",
"text": "An access issue was resolved by implementing additional restrictions in the sandbox environment to enhance security measures.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43497 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43497.json"
}
],
"title": "CVE-2025-43497"
},
{
"cve": "CVE-2025-43498",
"notes": [
{
"category": "description",
"text": "An authorization issue concerning sensitive user data access has been resolved through enhanced state management in iOS 26.1 and macOS Sequoia 15.7.2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43498 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43498.json"
}
],
"title": "CVE-2025-43498"
},
{
"cve": "CVE-2025-43499",
"notes": [
{
"category": "description",
"text": "macOS Sonoma 14.8.2 and macOS Sequoia 15.7.2 have resolved the issue of potential sensitive user data access through the implementation of additional entitlement checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43499 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43499.json"
}
],
"title": "CVE-2025-43499"
},
{
"cve": "CVE-2025-43500",
"notes": [
{
"category": "description",
"text": "Recent updates in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 have resolved a privacy issue regarding user preferences, enhancing the protection of sensitive user data from app access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43500 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43500.json"
}
],
"title": "CVE-2025-43500"
},
{
"cve": "CVE-2025-43502",
"notes": [
{
"category": "description",
"text": "Recent updates in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1 addressed a privacy issue by removing sensitive data to prevent the bypassing of privacy preferences.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43502 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43502.json"
}
],
"title": "CVE-2025-43502"
},
{
"cve": "CVE-2025-43503",
"notes": [
{
"category": "description",
"text": "An inconsistent user interface issue related to state management has been resolved across multiple operating systems, including watchOS, iOS, iPadOS, Safari, and visionOS, addressing potential spoofing risks from malicious websites.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43503 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43503.json"
}
],
"title": "CVE-2025-43503"
},
{
"cve": "CVE-2025-43506",
"notes": [
{
"category": "description",
"text": "A logic error was addressed by improving the error handling process, enhancing overall system reliability.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43506 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43506.json"
}
],
"title": "CVE-2025-43506"
},
{
"cve": "CVE-2025-43507",
"notes": [
{
"category": "description",
"text": "A privacy issue related to user fingerprinting was resolved in watchOS 26.1, iOS 26.1, iPadOS 26.1, and visionOS 26.1 by relocating sensitive data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43507 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43507.json"
}
],
"title": "CVE-2025-43507"
},
{
"cve": "CVE-2025-53906",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Vim version 9.1.1629 addresses multiple vulnerabilities, including path traversal issues in the tar.vim and zip.vim plugins, as well as memory management errors.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53906 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53906.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4"
]
}
],
"title": "CVE-2025-53906"
}
]
}
GHSA-WG34-QG7P-MHVV
Vulnerability from github – Published: 2025-11-04 03:30 – Updated: 2025-12-17 21:30The issue was addressed with improved checks. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. A malicious website may exfiltrate data cross-origin.
{
"affected": [],
"aliases": [
"CVE-2025-43480"
],
"database_specific": {
"cwe_ids": [
"CWE-942"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-04T02:15:52Z",
"severity": "HIGH"
},
"details": "The issue was addressed with improved checks. This issue is fixed in Safari 26.1, visionOS 26.1, watchOS 26.1, iOS 26.1 and iPadOS 26.1, tvOS 26.1. A malicious website may exfiltrate data cross-origin.",
"id": "GHSA-wg34-qg7p-mhvv",
"modified": "2025-12-17T21:30:38Z",
"published": "2025-11-04T03:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43480"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125632"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125634"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125637"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125638"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125639"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/125640"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.