Bug 2209208 (CVE-2023-28204)
| Summary: | CVE-2023-28204 webkitgtk: an out-of-bounds read when processing malicious content | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Marian Rehak <mrehak> | ||||
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
| Status: | CLOSED ERRATA | QA Contact: | |||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | unspecified | CC: | mcatanza, modehnal, tpelka, tpopela, ymittal | ||||
| Target Milestone: | --- | Keywords: | Security | ||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
| Doc Text: |
A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.
|
Story Points: | --- | ||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2023-06-06 00:33:10 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Bug Depends On: | 2209229, 2209738, 2209739, 2209740, 2209741, 2209742, 2209743, 2209744, 2209745, 2209746, 2209747, 2209748 | ||||||
| Bug Blocks: | 2209202 | ||||||
| Attachments: |
|
||||||
|
Description
Marian Rehak
2023-05-23 06:11:49 UTC
Created webkitgtk tracking bugs for this issue: Affects: fedora-all [bug 2209229] This is fixed by https://commits.webkit.org/264365@main This fix contains a test case, so for we can verify that the fix actually works. I've attached it to this bug. You can run: $ /usr/libexec/webkit2gtk-4.0/jsc test.js Without the fix, the test case uses lots of memory and keeps running indefinitely. With the fix, it should stop right away. Created attachment 1967144 [details]
Test case
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:3432 https://access.redhat.com/errata/RHSA-2023:3432 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:3433 https://access.redhat.com/errata/RHSA-2023:3433 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2023-28204 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364 |