{"schema_version": "1.3.1", "id": "RLSA-2022:7704", "modified": "2023-02-02T13:53:04.703160Z", "published": "2022-11-08T06:26:46Z", "related": ["CVE-2022-22624", "CVE-2022-22628", "CVE-2022-22629", "CVE-2022-22662", "CVE-2022-26700", "CVE-2022-26709", "CVE-2022-26710", "CVE-2022-26716", "CVE-2022-26717", "CVE-2022-26719", "CVE-2022-30293"], "summary": "Moderate: webkit2gtk3 security and bug fix update", "details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "webkit2gtk3", "purl": "pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.36.7-1.el8_6"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2022:7704"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061994"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099334"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}