DEBIAN-CVE-2024-27833

Source
https://security-tracker.debian.org/tracker/CVE-2024-27833
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-27833
Upstream
Downstream
Published
2024-06-10T21:15:51.090Z
Modified
2026-04-03T04:03:09.776191Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An integer overflow was addressed with improved input validation. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, tvOS 17.5, visionOS 1.2. Processing maliciously crafted web content may lead to arbitrary code execution.

References

Affected packages

Debian:11
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1~deb11u1

Affected versions

2.*
2.32.3-1
2.32.4-1~deb10u1
2.32.4-1~deb11u1
2.32.4-1
2.33.1-1
2.33.2-1
2.33.3-1
2.33.90-1
2.33.91-1
2.34.0-1~bpo11+1
2.34.0-1
2.34.1-1~deb10u1
2.34.1-1~deb11u1
2.34.1-1
2.34.2-1~bpo11+1
2.34.2-1
2.34.3-1~deb10u1
2.34.3-1~deb11u1
2.34.3-1
2.34.4-1~deb10u1
2.34.4-1~deb11u1
2.34.4-1
2.34.5-1
2.34.6-1~deb10u1
2.34.6-1~deb11u1
2.34.6-1
2.35.1-1
2.35.2-1
2.35.3-1
2.35.90-1
2.36.0-1
2.36.0-2
2.36.0-3~deb10u1
2.36.0-3~deb11u1
2.36.0-3
2.36.1-1
2.36.2-1
2.36.3-1~deb10u1
2.36.3-1~deb11u1
2.36.3-1
2.36.4-1~deb10u1
2.36.4-1~deb11u1
2.36.4-1
2.36.6-1~deb10u1
2.36.6-1~deb11u1
2.36.6-1
2.36.7-1~deb10u1
2.36.7-1~deb11u1
2.36.7-1
2.37.1-1
2.37.1-2
2.37.90-1
2.37.91-1
2.38.0-1~deb10u1
2.38.0-1~deb11u1
2.38.0-1
2.38.0-2
2.38.0-3
2.38.1-1
2.38.2-1~deb10u1
2.38.2-1~deb11u1
2.38.2-1
2.38.3-1~deb10u1
2.38.3-1~deb11u1
2.38.3-1
2.38.4-1
2.38.4-2~deb10u1
2.38.4-2~deb11u1
2.38.4-2
2.38.5-1~deb10u1
2.38.5-1~deb11u1
2.38.5-1
2.38.5-1+m68k
2.39.1-1
2.39.2-1
2.39.3-1
2.39.4-1
2.39.5-1
2.39.7-1
2.39.90-1
2.39.91-1
2.40.0-1
2.40.0-2
2.40.0-3
2.40.1-1~deb11u1
2.40.1-1
2.40.2-1~deb11u1
2.40.2-1~deb12u1
2.40.2-1
2.40.3-1
2.40.3-2~deb11u1
2.40.3-2~deb11u2
2.40.3-2~deb12u1
2.40.3-2~deb12u2
2.40.3-2
2.40.4-1
2.40.5-1~deb11u1
2.40.5-1~deb12u1
2.40.5-1
2.41.4-1
2.41.5-1
2.41.6-1
2.41.90-1
2.41.91-1
2.41.91-2
2.41.92-1
2.42.0-1~bpo12+1
2.42.0-1
2.42.1-1~bpo12+1
2.42.1-1~deb11u1
2.42.1-1~deb11u2
2.42.1-1~deb12u1
2.42.1-1
2.42.1-2
2.42.2-1~deb11u1
2.42.2-1~deb12u1
2.42.2-1
2.42.3-1~deb11u1
2.42.3-1~deb12u1
2.42.3-1
2.42.4-1~deb11u1
2.42.4-1~deb12u1
2.42.4-1
2.42.5-1~deb11u1
2.42.5-1~deb12u1
2.42.5-1
2.42.5-2
2.43.1-1
2.43.2-1
2.43.3-1
2.43.4-1
2.43.4-2
2.44.0-1
2.44.0-2
2.44.1-1~deb11u1
2.44.1-1~deb12u1
2.44.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.32.3-2
2.32.4-1~deb11u1
2.32.4-1
2.34.1-1~deb11u1
2.34.1-1
2.34.2-1
2.34.3-1~deb11u1
2.34.3-1
2.34.4-1~deb11u1
2.34.4-1
2.34.5-1
2.34.6-1~deb11u1
2.34.6-1
2.36.0-1
2.36.0-2~deb11u1
2.36.0-2
2.36.1-1
2.36.3-1~deb11u1
2.36.3-1
2.36.4-1~deb11u1
2.36.4-1
2.36.6-1~deb11u1
2.36.6-1
2.36.7-1~deb11u1
2.36.7-1
2.38.0-1~deb11u1
2.38.0-1
2.38.1-1
2.38.2-1~deb11u1
2.38.2-1
2.38.3-1~deb11u1
2.38.3-1
2.38.4-1~deb11u1
2.38.4-1
2.38.5-1~deb11u1
2.38.5-1
2.38.6-1~deb11u1
2.38.6-1
2.39.91-1
2.40.0-1
2.40.1-1
2.40.2-1
2.40.2-2
2.40.3-1
2.40.4-1
2.40.5-1
2.42.0-1
2.42.1-1
2.42.2-1
2.42.3-1
2.42.4-1
2.42.5-1
2.42.5-1.1~exp1
2.42.5-1.1
2.42.5-1.2
2.42.5-2~exp
2.44.1-1
2.44.2-1
2.44.2-2
2.44.3-1
2.44.4-1
2.46.1-1
2.46.2-1
2.46.3-1
2.46.4-1
2.46.5-1
2.46.6-1
2.48.0-1
2.48.1-1
2.48.1-2
2.48.2-1
2.48.3-1
2.48.5-1
2.48.6-1
2.48.6-2
2.50.0-1
2.50.0-2
2.50.1-1
2.50.2-1
2.50.3-1
2.50.4-1
2.50.5-1
2.50.6-1
2.52.0-1
2.52.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
Debian:12
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1~deb12u1

Affected versions

2.*
2.40.1-1
2.40.2-1~deb11u1
2.40.2-1~deb12u1
2.40.2-1
2.40.3-1
2.40.3-2~deb11u1
2.40.3-2~deb11u2
2.40.3-2~deb12u1
2.40.3-2~deb12u2
2.40.3-2
2.40.4-1
2.40.5-1~deb11u1
2.40.5-1~deb12u1
2.40.5-1
2.41.4-1
2.41.5-1
2.41.6-1
2.41.90-1
2.41.91-1
2.41.91-2
2.41.92-1
2.42.0-1~bpo12+1
2.42.0-1
2.42.1-1~bpo12+1
2.42.1-1~deb11u1
2.42.1-1~deb11u2
2.42.1-1~deb12u1
2.42.1-1
2.42.1-2
2.42.2-1~deb11u1
2.42.2-1~deb12u1
2.42.2-1
2.42.3-1~deb11u1
2.42.3-1~deb12u1
2.42.3-1
2.42.4-1~deb11u1
2.42.4-1~deb12u1
2.42.4-1
2.42.5-1~deb11u1
2.42.5-1~deb12u1
2.42.5-1
2.42.5-2
2.43.1-1
2.43.2-1
2.43.3-1
2.43.4-1
2.43.4-2
2.44.0-1
2.44.0-2
2.44.1-1~deb11u1
2.44.1-1~deb12u1
2.44.1-1
2.44.2-1~deb11u1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.38.6-1
2.39.91-1
2.40.0-1
2.40.1-1
2.40.2-1
2.40.2-2
2.40.3-1
2.40.4-1
2.40.5-1
2.42.0-1
2.42.1-1
2.42.2-1
2.42.3-1
2.42.4-1
2.42.5-1
2.42.5-1.1~exp1
2.42.5-1.1
2.42.5-1.2
2.42.5-2~exp
2.44.1-1
2.44.2-1
2.44.2-2
2.44.3-1
2.44.4-1
2.46.1-1
2.46.2-1
2.46.3-1
2.46.4-1
2.46.5-1
2.46.6-1
2.48.0-1
2.48.1-1
2.48.1-2
2.48.2-1
2.48.3-1
2.48.5-1
2.48.6-1
2.48.6-2
2.50.0-1
2.50.0-2
2.50.1-1
2.50.2-1
2.50.3-1
2.50.4-1
2.50.5-1
2.50.6-1
2.52.0-1
2.52.1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
Debian:13
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
Debian:14
webkit2gtk

Package

Name
webkit2gtk
Purl
pkg:deb/debian/webkit2gtk?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"
wpewebkit

Package

Name
wpewebkit
Purl
pkg:deb/debian/wpewebkit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.2-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-27833.json"