Improper Input Validation Affecting glib2-doc package, versions <0:2.56.4-9.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-GLIB2DOC-3968784
- published 26 Jul 2021
- disclosed 30 Nov 2020
How to fix?
Upgrade RHEL:8
glib2-doc
to version 0:2.56.4-9.el8 or higher.
This issue was patched in RHSA-2021:1586
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream glib2-doc
package and not the glib2-doc
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.