Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-24209

Опубликовано: 31 мар. 2025
Источник: debian

Описание

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected process crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webkit2gtkfixed2.48.1-1package
wpewebkitfixed2.48.1-1package
wpewebkitignoredbookwormpackage
wpewebkitignoredbullseyepackage

Примечания

  • https://webkitgtk.org/security/WSA-2025-0003.html

Связанные уязвимости

CVSS3: 7
ubuntu
около 1 года назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash.

CVSS3: 8.8
redhat
около 1 года назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected process crash.

CVSS3: 7
nvd
около 1 года назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected process crash.

CVSS3: 7
github
около 1 года назад

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 18.4, Safari 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Processing maliciously crafted web content may lead to an unexpected process crash.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целость и доступность защищаемой информации