First published: Wed Jul 07 2021(Updated: )
A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebKitGTK WebKitGTK | =2.30.4 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Debian Debian Linux | =10.0 | |
debian/webkit2gtk | 2.36.4-1~deb10u1 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21775 is a use-after-free vulnerability in Webkit WebKitGTK 2.30.4 that can lead to information leakage and memory corruption.
CVE-2021-21775 has a severity rating of 8, which is considered high.
CVE-2021-21775 affects Webkit WebKitGTK 2.30.4 and can be exploited through a specially crafted web page.
To fix CVE-2021-21775, update to the following versions: 2.36.4-1~deb10u1, 2.38.6-0+deb10u1, 2.40.5-1~deb11u1, 2.42.1-1~deb11u2, 2.40.5-1~deb12u1, 2.42.1-1~deb12u1, or 2.42.1-2.
You can find more information about CVE-2021-21775 at the following references: [1] Talos Intelligence, [2] Debian Security Tracker, [3] Openwall.