Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-27833

Опубликовано: 10 июн. 2024
Источник: debian

Описание

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.44.2-1package
webkit2gtkend-of-lifebusterpackage
wpewebkitfixed2.44.2-1package
wpewebkitignoredbookwormpackage
wpewebkitignoredbullseyepackage

Примечания

  • https://webkitgtk.org/security/WSA-2024-0005.html

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 1 года назад

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
redhat
больше 1 года назад

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
nvd
больше 1 года назад

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
github
больше 1 года назад

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании