Bug 2351802 (CVE-2025-24201)

Summary: CVE-2025-24201 webkitgtk: out-of-bounds write vulnerability
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2352355, 2352356    
Bug Blocks:    

Description OSIDB Bzimport 2025-03-13 04:40:16 UTC
An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).

Comment 1 errata-xmlrpc 2025-03-17 01:38:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:2863 https://access.redhat.com/errata/RHSA-2025:2863

Comment 2 errata-xmlrpc 2025-03-17 01:39:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:2864 https://access.redhat.com/errata/RHSA-2025:2864

Comment 3 errata-xmlrpc 2025-03-18 02:24:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:2997 https://access.redhat.com/errata/RHSA-2025:2997

Comment 4 errata-xmlrpc 2025-03-18 03:24:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:2998 https://access.redhat.com/errata/RHSA-2025:2998

Comment 5 errata-xmlrpc 2025-03-18 05:19:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:3000 https://access.redhat.com/errata/RHSA-2025:3000

Comment 6 errata-xmlrpc 2025-03-18 07:41:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:3001 https://access.redhat.com/errata/RHSA-2025:3001

Comment 7 errata-xmlrpc 2025-03-18 08:14:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:3002 https://access.redhat.com/errata/RHSA-2025:3002

Comment 8 errata-xmlrpc 2025-03-18 09:09:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2025:3005 https://access.redhat.com/errata/RHSA-2025:3005

Comment 9 errata-xmlrpc 2025-03-19 03:43:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:3034 https://access.redhat.com/errata/RHSA-2025:3034