CVE-2022-22637 Affecting webkitgtk4-plugin-process-gtk2 package, versions *
Threat Intelligence
EPSS
0.33% (72nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-WEBKITGTK4PLUGINPROCESSGTK2-2607105
- published 11 Apr 2022
- disclosed 8 Apr 2022
Introduced: 8 Apr 2022
CVE-2022-22637 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
webkitgtk4-plugin-process-gtk2
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream webkitgtk4-plugin-process-gtk2
package and not the webkitgtk4-plugin-process-gtk2
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. A malicious website may cause unexpected cross-origin behavior.
References
- https://access.redhat.com/security/cve/CVE-2022-22637
- https://access.redhat.com/errata/RHSA-2022:1777
- https://support.apple.com/en-us/HT213182
- https://support.apple.com/en-us/HT213183
- https://support.apple.com/en-us/HT213186
- https://support.apple.com/en-us/HT213187
- https://support.apple.com/en-us/HT213193
CVSS Scores
version 3.1