DEBIAN-CVE-2024-23222

Source
https://security-tracker.debian.org/tracker/CVE-2024-23222
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-23222
Upstream
Downstream
Published
2024-01-23T01:15:11.500Z
Modified
2026-04-03T04:02:44.882160Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A type confusion issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 15.8.7 and iPadOS 15.8.7, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, tvOS 17.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.

References

Affected packages

Debian:11
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1~deb11u1

Affected versions

2.*
2.32.3-1
2.32.4-1~deb10u1
2.32.4-1~deb11u1
2.32.4-1
2.33.1-1
2.33.2-1
2.33.3-1
2.33.90-1
2.33.91-1
2.34.0-1~bpo11+1
2.34.0-1
2.34.1-1~deb10u1
2.34.1-1~deb11u1
2.34.1-1
2.34.2-1~bpo11+1
2.34.2-1
2.34.3-1~deb10u1
2.34.3-1~deb11u1
2.34.3-1
2.34.4-1~deb10u1
2.34.4-1~deb11u1
2.34.4-1
2.34.5-1
2.34.6-1~deb10u1
2.34.6-1~deb11u1
2.34.6-1
2.35.1-1
2.35.2-1
2.35.3-1
2.35.90-1
2.36.0-1
2.36.0-2
2.36.0-3~deb10u1
2.36.0-3~deb11u1
2.36.0-3
2.36.1-1
2.36.2-1
2.36.3-1~deb10u1
2.36.3-1~deb11u1
2.36.3-1
2.36.4-1~deb10u1
2.36.4-1~deb11u1
2.36.4-1
2.36.6-1~deb10u1
2.36.6-1~deb11u1
2.36.6-1
2.36.7-1~deb10u1
2.36.7-1~deb11u1
2.36.7-1
2.37.1-1
2.37.1-2
2.37.90-1
2.37.91-1
2.38.0-1~deb10u1
2.38.0-1~deb11u1
2.38.0-1
2.38.0-2
2.38.0-3
2.38.1-1
2.38.2-1~deb10u1
2.38.2-1~deb11u1
2.38.2-1
2.38.3-1~deb10u1
2.38.3-1~deb11u1
2.38.3-1
2.38.4-1
2.38.4-2~deb10u1
2.38.4-2~deb11u1
2.38.4-2
2.38.5-1~deb10u1
2.38.5-1~deb11u1
2.38.5-1
2.38.5-1+m68k
2.39.1-1
2.39.2-1
2.39.3-1
2.39.4-1
2.39.5-1
2.39.7-1
2.39.90-1
2.39.91-1
2.40.0-1
2.40.0-2
2.40.0-3
2.40.1-1~deb11u1
2.40.1-1
2.40.2-1~deb11u1
2.40.2-1~deb12u1
2.40.2-1
2.40.3-1
2.40.3-2~deb11u1
2.40.3-2~deb11u2
2.40.3-2~deb12u1
2.40.3-2~deb12u2
2.40.3-2
2.40.4-1
2.40.5-1~deb11u1
2.40.5-1~deb12u1
2.40.5-1
2.41.4-1
2.41.5-1
2.41.6-1
2.41.90-1
2.41.91-1
2.41.91-2
2.41.92-1
2.42.0-1~bpo12+1
2.42.0-1
2.42.1-1~bpo12+1
2.42.1-1~deb11u1
2.42.1-1~deb11u2
2.42.1-1~deb12u1
2.42.1-1
2.42.1-2
2.42.2-1~deb11u1
2.42.2-1~deb12u1
2.42.2-1
2.42.3-1~deb11u1
2.42.3-1~deb12u1
2.42.3-1
2.42.4-1~deb11u1
2.42.4-1~deb12u1
2.42.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.32.3-2
2.32.4-1~deb11u1
2.32.4-1
2.34.1-1~deb11u1
2.34.1-1
2.34.2-1
2.34.3-1~deb11u1
2.34.3-1
2.34.4-1~deb11u1
2.34.4-1
2.34.5-1
2.34.6-1~deb11u1
2.34.6-1
2.36.0-1
2.36.0-2~deb11u1
2.36.0-2
2.36.1-1
2.36.3-1~deb11u1
2.36.3-1
2.36.4-1~deb11u1
2.36.4-1
2.36.6-1~deb11u1
2.36.6-1
2.36.7-1~deb11u1
2.36.7-1
2.38.0-1~deb11u1
2.38.0-1
2.38.1-1
2.38.2-1~deb11u1
2.38.2-1
2.38.3-1~deb11u1
2.38.3-1
2.38.4-1~deb11u1
2.38.4-1
2.38.5-1~deb11u1
2.38.5-1
2.38.6-1~deb11u1
2.38.6-1
2.39.91-1
2.40.0-1
2.40.1-1
2.40.2-1
2.40.2-2
2.40.3-1
2.40.4-1
2.40.5-1
2.42.0-1
2.42.1-1
2.42.2-1
2.42.3-1
2.42.4-1
2.42.5-1
2.42.5-1.1~exp1
2.42.5-1.1
2.42.5-1.2
2.42.5-2~exp
2.44.1-1
2.44.2-1
2.44.2-2
2.44.3-1
2.44.4-1
2.46.1-1
2.46.2-1
2.46.3-1
2.46.4-1
2.46.5-1
2.46.6-1
2.48.0-1
2.48.1-1
2.48.1-2
2.48.2-1
2.48.3-1
2.48.5-1
2.48.6-1
2.48.6-2
2.50.0-1
2.50.0-2
2.50.1-1
2.50.2-1
2.50.3-1
2.50.4-1
2.50.5-1
2.50.6-1
2.52.0-1
2.52.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
Debian:12
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1~deb12u1

Affected versions

2.*
2.40.1-1
2.40.2-1~deb11u1
2.40.2-1~deb12u1
2.40.2-1
2.40.3-1
2.40.3-2~deb11u1
2.40.3-2~deb11u2
2.40.3-2~deb12u1
2.40.3-2~deb12u2
2.40.3-2
2.40.4-1
2.40.5-1~deb11u1
2.40.5-1~deb12u1
2.40.5-1
2.41.4-1
2.41.5-1
2.41.6-1
2.41.90-1
2.41.91-1
2.41.91-2
2.41.92-1
2.42.0-1~bpo12+1
2.42.0-1
2.42.1-1~bpo12+1
2.42.1-1~deb11u1
2.42.1-1~deb11u2
2.42.1-1~deb12u1
2.42.1-1
2.42.1-2
2.42.2-1~deb11u1
2.42.2-1~deb12u1
2.42.2-1
2.42.3-1~deb11u1
2.42.3-1~deb12u1
2.42.3-1
2.42.4-1~deb11u1
2.42.4-1~deb12u1
2.42.4-1
2.42.5-1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.38.6-1
2.39.91-1
2.40.0-1
2.40.1-1
2.40.2-1
2.40.2-2
2.40.3-1
2.40.4-1
2.40.5-1
2.42.0-1
2.42.1-1
2.42.2-1
2.42.3-1
2.42.4-1
2.42.5-1
2.42.5-1.1~exp1
2.42.5-1.1
2.42.5-1.2
2.42.5-2~exp
2.44.1-1
2.44.2-1
2.44.2-2
2.44.3-1
2.44.4-1
2.46.1-1
2.46.2-1
2.46.3-1
2.46.4-1
2.46.5-1
2.46.6-1
2.48.0-1
2.48.1-1
2.48.1-2
2.48.2-1
2.48.3-1
2.48.5-1
2.48.6-1
2.48.6-2
2.50.0-1
2.50.0-2
2.50.1-1
2.50.2-1
2.50.3-1
2.50.4-1
2.50.5-1
2.50.6-1
2.52.0-1
2.52.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
Debian:13
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
Debian:14
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.42.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-23222.json"