diff options
author | Yogita Urade <yogita.urade@windriver.com> | 2023-06-09 14:09:05 +0000 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2023-06-21 04:00:58 -1000 |
commit | b4a7ec6e0e41c442024da3d5d4e20c3c807f55dd (patch) | |
tree | c7d4623f46a9dd9448912ff7a1cfec77e8f33faa /scripts/lib/devtool/runqemu.py | |
parent | ab62b82a81a21b59e139ea32d7f2d3f8b5951f5b (diff) | |
download | poky-b4a7ec6e0e41c442024da3d5d4e20c3c807f55dd.tar.gz |
webkitgtk: fix CVE-2022-42867
A use after free issue was addressed with improved memory management.
This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS
16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web
content may lead to arbitrary code execution.
Reference:
https://nvd.nist.gov/vuln/detail/CVE-2022-42867
https://support.apple.com/en-us/HT213537
(From OE-Core rev: d4a872b6ac8c41d9c3f4d5f7255d4561684ef7d5)
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/lib/devtool/runqemu.py')
0 files changed, 0 insertions, 0 deletions