MGASA-2025-0291

Source
https://advisories.mageia.org/MGASA-2025-0291.html
Import Source
https://advisories.mageia.org/MGASA-2025-0291.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0291
Related
Published
2025-11-14T16:41:49Z
Modified
2025-11-14T15:58:09Z
Summary
Updated webkit2 packages fix security vulnerabilities
Details

CVE-2024-27838 A maliciously crafted webpage may be able to fingerprint the user. Description: The issue was addressed by adding additional logic. CVE-2024-27851 Processing maliciously crafted web content may lead to arbitrary code execution. Description: The issue was addressed with improved bounds checks. CVE-2024-40776 Processing maliciously crafted web content may lead to an unexpected process crash. Description: A use-after-free issue was addressed with improved memory management. CVE-2024-40779 / CVE-2024-40780 Processing maliciously crafted web content may lead to an unexpected process crash. Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2024-40782 Processing maliciously crafted web content may lead to an unexpected process crash. Description: A use-after-free issue was addressed with improved memory management. CVE-2024-40789 Processing maliciously crafted web content may lead to an unexpected process crash. Description: An out-of-bounds access issue was addressed with improved bounds checking. CVE-2024-4558 Processing maliciously crafted web content may lead to an unexpected process crash. Description: Use after free in ANGLE allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.

References
Credits

Affected packages

Mageia:9 / webkit2

Package

Name
webkit2
Purl
pkg:rpm/mageia/webkit2?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.44.4-1.mga9

Ecosystem specific

{
    "section": "core"
}