Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:4202

Опубликовано: 08 авг. 2023
Источник: rocky
Оценка: Important

Описание

Important: webkit2gtk3 security update

WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.

Security Fix(es):

  • webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)

  • webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
webkit2gtk3x86_641.el8_8.5webkit2gtk3-2.38.5-1.el8_8.5.x86_64.rpm
webkit2gtk3-develx86_641.el8_8.5webkit2gtk3-devel-2.38.5-1.el8_8.5.x86_64.rpm
webkit2gtk3-jscx86_641.el8_8.5webkit2gtk3-jsc-2.38.5-1.el8_8.5.x86_64.rpm
webkit2gtk3-jsc-develx86_641.el8_8.5webkit2gtk3-jsc-devel-2.38.5-1.el8_8.5.x86_64.rpm

Показывать по

Связанные уязвимости

rocky
около 2 лет назад

Important: webkit2gtk3 security update

oracle-oval
около 2 лет назад

ELSA-2023-4202: webkit2gtk3 security update (IMPORTANT)

oracle-oval
около 2 лет назад

ELSA-2023-4201: webkit2gtk3 security update (IMPORTANT)

CVSS3: 8.8
ubuntu
около 2 лет назад

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.

CVSS3: 8.8
redhat
около 2 лет назад

A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.