{"id":"RLSA-2024:9636","summary":"Important: webkit2gtk3 security update","details":"WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-05T09:45:07.051604Z","published":"2024-11-19T16:01:03.545733Z","upstream":["CVE-2024-23271","CVE-2024-27820","CVE-2024-27838","CVE-2024-27851","CVE-2024-40779","CVE-2024-40780","CVE-2024-40782","CVE-2024-40789","CVE-2024-40866","CVE-2024-44185","CVE-2024-44187","CVE-2024-44244","CVE-2024-44296","CVE-2024-4558"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:9636"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323289"}],"affected":[{"package":{"name":"webkit2gtk3","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.46.3-1.el8_10"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:9636.json"}}],"schema_version":"1.7.3","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}