UBUNTU-CVE-2011-0132

Source
https://ubuntu.com/security/CVE-2011-0132
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2011/UBUNTU-CVE-2011-0132.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2011-0132
Upstream
  • CVE-2011-0132
Published
2011-03-03T20:00:00Z
Modified
2026-04-22T08:53:17.630095Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

Use-after-free vulnerability in the Runin box functionality in the Cascading Style Sheets (CSS) 2.1 Visual Formatting Model implementation in WebKit, as used in Apple iTunes before 10.2 on Windows and Apple Safari, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-03-02-1.

References

Affected packages

Ubuntu:16.04:LTS / qtwebkit-source

Package

Name
qtwebkit-source
Purl
pkg:deb/ubuntu/qtwebkit-source@2.3.2-0ubuntu11?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*
2.3.2-0ubuntu10
2.3.2-0ubuntu11

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.3.2-0ubuntu11",
            "binary_name": "libqtwebkit-qmlwebkitplugin"
        },
        {
            "binary_version": "2.3.2-0ubuntu11",
            "binary_name": "libqtwebkit4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2011/UBUNTU-CVE-2011-0132.json"