First published: Fri Apr 21 2023(Updated: )
A flaw was found in the WebKitGTK package. An improper input validation issue may lead to a use-after-free vulnerability. This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. This CVE exists because of a CVE-2023-28205 security regression for the WebKitGTK package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webkitgtk Webkit2gtk3 | =2.38.5-1.el8 | |
Webkitgtk Webkit2gtk3 | =2.38.5-1.el9 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.8 | |
Redhat Enterprise Linux Eus | =9.2 | |
Redhat Enterprise Linux Server Aus | =8.8 | |
Redhat Enterprise Linux Server Aus | =9.2 | |
Redhat Enterprise Linux Server Tus | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2203 is a use-after-free vulnerability found in the WebKitGTK package that allows attackers to execute arbitrary code or cause a denial of service.
Versions 2.38.5-1.el8 and 2.38.5-1.el9 of WebKitGTK package, Redhat Enterprise Linux 8.0 and 9.0, and Redhat Enterprise Linux Eus 8.8 and 9.2 are affected by CVE-2023-2203.
CVE-2023-2203 has a severity level of 8.8 (high).
Apply the necessary updates provided by Red Hat through the official Red Hat Security Advisory RHSA-2023:1919.
CVE-2023-2203 is associated with CWE-416 and CWE-20.