- Description
- A vulnerability was found in WebKit. The flaw is triggered when processing maliciously crafted web content that may lead to arbitrary code execution. Improved memory handling addresses the multiple memory corruption issues.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- WebKitGTK Memory Corruption Vulnerability
- Exploit added on
- May 23, 2022
- Exploit action due
- Jun 13, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9A074F91-F0EF-4427-B9AB-A2EE9C899272",
"versionEndExcluding": "2.26.0"
},
{
"criteria": "cpe:2.3:a:wpewebkit:wpe_webkit:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1B5D0857-4DA0-41D2-A8F4-FE70E80B9F64",
"versionEndExcluding": "2.26.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "93A089E2-D66E-455C-969A-3140D991BAF4"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B399239A-5211-4174-9A47-A71DBA786426"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8BE16CC2-C6B4-4B73-98A1-F28475A92F49"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "84BC50C8-5907-4BFF-BD0F-C20586F81DC4"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AA48C33A-ECCA-41A8-8A32-CD4FAD6D963B"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB1DF28D-0D84-4E40-8E46-BA0EFD371111"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1903C71D-08F1-4B84-AE75-62A84CB789E1"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40A60CB0-824E-4D3B-B26F-28E1F5EDDE44"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3C1A0CA2-2BBD-4A7A-B467-F456867D5EC6"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B3F1B4FA-2161-4BE6-93E9-745E543B326C"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "58D2C068-2FF0-4FAB-8317-3ABC6EF8B988"
},
{
"criteria": "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "845B853C-8F99-4987-AA8E-76078CE6A977"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm64:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "40D24D63-0C1F-4470-8BB9-A2F0E54B9278"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm64_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D2E41863-BE2C-4A31-B60D-EED8803187E5"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm64_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F76C4F35-2E16-40BF-AFF3-249316757798"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9EF5C4AC-CA69-41E3-AD93-7AC21931374A"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "729C515E-1DD3-466D-A50B-AFE058FFC94A"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "76C24D94-834A-4E9D-8F73-624AFA99AAA2"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "22D095ED-9247-4133-A133-73B7668565E4"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "871A5C26-DB7B-4870-A5B2-5DD24C90B4A7"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1272DF03-7674-4BD4-8E64-94004B195448"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7614E5D3-4643-4CAE-9578-9BB9D558211F"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
],
"operator": "OR"
}
]
}
]