WebKitGTK is vulnerable to arbitrary code execution. A memory corruption issue (use-after-free) allows an attacker to execute arbitrary code.
lists.opensuse.org/opensuse-security-announce/2020-05/msg00008.html
bugs.webkit.org/show_bug.cgi?id=204342#c21
lists.fedoraproject.org/archives/list/[email protected]/message/DOR5LPL4UASVAR76EIHCL4O2KGDWGC6K/
lists.fedoraproject.org/archives/list/[email protected]/message/GLERWAS2LL7SX2GHA2DDZ2PL3QC5OHIF/
security.gentoo.org/glsa/202006-08
usn.ubuntu.com/4310-1/
webkitgtk.org/security/WSA-2020-0003.html
wpewebkit.org/security/WSA-2020-0003.html
www.debian.org/security/2020/dsa-4641