{"id":"RLSA-2022:8054","summary":"Moderate: webkit2gtk3 security and bug fix update","details":"WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 9.1 Release Notes linked from the References section.","modified":"2026-02-04T16:45:09.187785Z","published":"2022-11-15T06:14:22Z","upstream":["CVE-2022-22624","CVE-2022-22628","CVE-2022-22629","CVE-2022-22662","CVE-2022-26700","CVE-2022-26709","CVE-2022-26710","CVE-2022-26716","CVE-2022-26717","CVE-2022-26719","CVE-2022-30293"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2022:8054"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061996"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073893"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073896"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073899"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082548"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092732"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092733"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092734"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092735"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092736"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104789"}],"affected":[{"package":{"name":"webkit2gtk3","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-9-0-legacy&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.36.7-1.el9_0"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:8054.json"}},{"package":{"name":"webkit2gtk3","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.36.7-1.el9_1.1"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2022:8054.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}