{"id":"RHSA-2024:2126","summary":"Red Hat Security Advisory: webkit2gtk3 security update","modified":"2026-03-18T10:24:39Z","published":"2024-09-16T13:50:56Z","upstream":["CVE-2014-1745","CVE-2023-32359","CVE-2023-39928","CVE-2023-40414","CVE-2023-41983","CVE-2023-42852","CVE-2023-42875","CVE-2023-42883","CVE-2023-42890","CVE-2023-42917","CVE-2023-42970","CVE-2023-43000","CVE-2024-23271"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"type":"ARTICLE","url":"https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.4_release_notes/index"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254326"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254327"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270143"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270151"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271449"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271453"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-3960"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2126.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-1745"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-1745"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-1745"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2024-0001.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32359"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32359"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32359"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2023-0010.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-39928"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-39928"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39928"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2023-0009.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-40414"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-40414"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-40414"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-41983"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-41983"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-41983"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42852"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42852"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42852"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42875"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42875"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42875"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2025-0004.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42883"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42883"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42890"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42890"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42890"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42917"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42917"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42917"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2023-0011.html"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-42970"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-42970"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-42970"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-43000"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-43000"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-43000"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2025-0008.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-23271"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-23271"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-23271"},{"type":"ARTICLE","url":"https://webkitgtk.org/security/WSA-2024-0005.html"}],"affected":[{"package":{"name":"webkit2gtk3","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-debugsource","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-devel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-devel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-jsc","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-jsc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-jsc-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-jsc-devel","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-jsc-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}},{"package":{"name":"webkit2gtk3-jsc-devel-debuginfo","ecosystem":"Red Hat:enterprise_linux:9::appstream","purl":"pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.42.5-1.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:2126.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}