Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. A memory corruption vulnerability was addressed with improved locking. Reference: https://webkitgtk.org/security/WSA-2023-0011.html
Created webkitgtk tracking bugs for this issue: Affects: fedora-all [bug 2253059]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:7715 https://access.redhat.com/errata/RHSA-2023:7715
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:7716 https://access.redhat.com/errata/RHSA-2023:7716
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2024:8492 https://access.redhat.com/errata/RHSA-2024:8492
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2024:8496 https://access.redhat.com/errata/RHSA-2024:8496
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2024:9646 https://access.redhat.com/errata/RHSA-2024:9646
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2024:9653 https://access.redhat.com/errata/RHSA-2024:9653
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2024:9680 https://access.redhat.com/errata/RHSA-2024:9680
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2024:9679 https://access.redhat.com/errata/RHSA-2024:9679
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:2982 https://access.redhat.com/errata/RHSA-2024:2982
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2126 https://access.redhat.com/errata/RHSA-2024:2126