CVE-2023-43000
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
- webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
- webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
- webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
- webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
- webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
- webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
- webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
- webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
- webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
- webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9 Release Notes linked from the References section.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://access.redhat.com/errata/RHSA-2024:2126, https://access.redhat.com/security/cve/CVE-2014-1745, https://access.redhat.com/security/cve/CVE-2023-32359, https://access.redhat.com/security/cve/CVE-2023-39928, https://access.redhat.com/security/cve/CVE-2023-40414, https://access.redhat.com/security/cve/CVE-2023-41983, https://access.redhat.com/security/cve/CVE-2023-42852, https://access.redhat.com/security/cve/CVE-2023-42875, https://access.redhat.com/security/cve/CVE-2023-42883, https://access.redhat.com/security/cve/CVE-2023-42890, https://access.redhat.com/security/cve/CVE-2023-42917, https://access.redhat.com/security/cve/CVE-2023-42970, https://access.redhat.com/security/cve/CVE-2023-43000, https://access.redhat.com/security/cve/CVE-2024-23271
