ALT-PU-2022-2494-2
Package libwebkitgtk4.1 updated to version 2.36.7-alt1 for branch sisyphus in task 305731.
Closed vulnerabilities
Modified: 2025-08-13
BDU:2022-05100
Уязвимость модуля отображения веб-страниц WebKit операционных систем macOS, iOS, iPadOS, позволяющая нарушителю выполнить произвольный код
Modified: 2024-04-03
BDU:2022-05716
Уязвимость модуля отображения веб-страниц WebKitGTK, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-22590
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.
- https://security.gentoo.org/glsa/202208-39
- https://support.apple.com/en-us/HT213053
- https://support.apple.com/en-us/HT213054
- https://support.apple.com/en-us/HT213057
- https://support.apple.com/en-us/HT213058
- https://support.apple.com/en-us/HT213059
- https://security.gentoo.org/glsa/202208-39
- https://support.apple.com/en-us/HT213053
- https://support.apple.com/en-us/HT213054
- https://support.apple.com/en-us/HT213057
- https://support.apple.com/en-us/HT213058
- https://support.apple.com/en-us/HT213059
Modified: 2025-10-23
CVE-2022-32893
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
- http://seclists.org/fulldisclosure/2022/Aug/16
- http://seclists.org/fulldisclosure/2022/Oct/49
- http://www.openwall.com/lists/oss-security/2022/08/25/5
- http://www.openwall.com/lists/oss-security/2022/08/26/2
- http://www.openwall.com/lists/oss-security/2022/08/29/1
- http://www.openwall.com/lists/oss-security/2022/08/29/2
- http://www.openwall.com/lists/oss-security/2022/09/02/10
- http://www.openwall.com/lists/oss-security/2022/09/13/1
- https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
- https://security.gentoo.org/glsa/202208-39
- https://support.apple.com/en-us/HT213412
- https://support.apple.com/en-us/HT213413
- https://support.apple.com/en-us/HT213414
- https://www.debian.org/security/2022/dsa-5219
- https://www.debian.org/security/2022/dsa-5220
- http://seclists.org/fulldisclosure/2022/Aug/16
- http://seclists.org/fulldisclosure/2022/Oct/49
- http://www.openwall.com/lists/oss-security/2022/08/25/5
- http://www.openwall.com/lists/oss-security/2022/08/26/2
- http://www.openwall.com/lists/oss-security/2022/08/29/1
- http://www.openwall.com/lists/oss-security/2022/08/29/2
- http://www.openwall.com/lists/oss-security/2022/09/02/10
- http://www.openwall.com/lists/oss-security/2022/09/13/1
- https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
- https://security.gentoo.org/glsa/202208-39
- https://support.apple.com/en-us/HT213412
- https://support.apple.com/en-us/HT213413
- https://support.apple.com/en-us/HT213414
- https://www.debian.org/security/2022/dsa-5219
- https://www.debian.org/security/2022/dsa-5220
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-32893
