A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to visit a malicious webpage to trigger this vulnerability. Reference: https://webkitgtk.org/security/WSA-2023-0009.html#CVE-2023-39928
Created webkitgtk tracking bugs for this issue: Affects: fedora-all [bug 2241401]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:2126 https://access.redhat.com/errata/RHSA-2024:2126