First published: Wed Nov 13 2024(Updated: )
Important: webkit2gtk3 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/webkit2gtk3 | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3 | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debugsource | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debugsource | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3 | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-debugsource | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3-jsc-devel-debuginfo | <2.46.3-1.el9_5 | 2.46.3-1.el9_5 |
redhat/webkit2gtk3 | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-debuginfo | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-debugsource | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-devel | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-devel-debuginfo | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-jsc | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-jsc-debuginfo | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-jsc-devel | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
redhat/webkit2gtk3-jsc-devel-debuginfo | <2.46.3-1.el9_5.aa | 2.46.3-1.el9_5.aa |
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:9553 is classified as an important security update.
To fix RHSA-2024:9553, update to the package version 2.46.3-1.el9_5.
RHSA-2024:9553 addresses vulnerabilities such as address bar spoofing (CVE-2024-40866) when visiting malicious websites.
RHSA-2024:9553 affects Red Hat Enterprise Linux for x86_64, IBM z Systems, ARM 64, and Power, little endian.
Yes, version 2.46.3-1.el9_5 is required to resolve RHSA-2024:9553.