{"id":"RLSA-2024:8180","summary":"Important: webkit2gtk3 security update","details":"WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-11T06:30:06.609446Z","published":"2024-10-25T17:17:26.358059Z","upstream":["CVE-2024-23271","CVE-2024-27820","CVE-2024-27838","CVE-2024-27851","CVE-2024-40776","CVE-2024-40779","CVE-2024-40780","CVE-2024-40782","CVE-2024-40789","CVE-2024-40866","CVE-2024-44187"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:8180"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312724"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314696"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314702"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314706"}],"affected":[{"package":{"name":"webkit2gtk3","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-9&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.46.1-2.el9_4"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:8180.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}