RLSA-2024:8180

Source
https://errata.rockylinux.org/RLSA-2024:8180
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:8180.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:8180
Related
Published
2024-10-25T17:17:26.358059Z
Modified
2024-10-25T17:18:48.038210Z
Summary
Important: webkit2gtk3 security update
Details

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

  • webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)

  • webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)

  • webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)

  • webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)

  • webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)

  • webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)

  • webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)

  • webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)

  • webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)

  • webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)

  • webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / webkit2gtk3

Package

Name
webkit2gtk3
Purl
pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2.46.1-2.el9_4