Risk | Critical |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2022-0108 CVE-2022-32885 CVE-2022-32886 CVE-2022-32912 CVE-2023-25358 CVE-2023-25360 CVE-2023-25361 CVE-2023-25362 CVE-2023-25363 CVE-2023-27932 CVE-2023-27954 CVE-2023-28205 |
CWE-ID | CWE-358 CWE-119 CWE-125 CWE-416 CWE-254 CWE-200 |
Exploitation vector | Network |
Public exploit | Vulnerability #12 is being exploited in the wild. |
Vulnerable software |
Development Tools Module Operating systems & Components / Operating system Desktop Applications Module Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise Real Time 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE Linux Enterprise Desktop 15 Operating systems & Components / Operating system Basesystem Module Operating systems & Components / Operating system SUSE Manager Retail Branch Server Operating systems & Components / Operating system SUSE Manager Server Operating systems & Components / Operating system SUSE Manager Proxy Operating systems & Components / Operating system openSUSE Leap Operating systems & Components / Operating system libwebkit2gtk-4_1-0-32bit-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_1-0-32bit Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_1-0-32bit-debuginfo Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18-32bit Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37-32bit-debuginfo Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18-32bit-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37-32bit Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_1-0-32bit Operating systems & Components / Operating system package or component webkit2gtk3-minibrowser Operating systems & Components / Operating system package or component webkit2gtk-4_0-injected-bundles-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37 Operating systems & Components / Operating system package or component typelib-1_0-WebKit2WebExtension-5_0 Operating systems & Components / Operating system package or component webkit2gtk3-soup2-devel Operating systems & Components / Operating system package or component typelib-1_0-JavaScriptCore-5_0 Operating systems & Components / Operating system package or component webkit2gtk4-minibrowser Operating systems & Components / Operating system package or component typelib-1_0-JavaScriptCore-4_1 Operating systems & Components / Operating system package or component libwebkit2gtk-4_1-0-debuginfo Operating systems & Components / Operating system package or component webkit2gtk3-soup2-minibrowser Operating systems & Components / Operating system package or component webkit2gtk-5_0-injected-bundles-debuginfo Operating systems & Components / Operating system package or component webkit2gtk3-minibrowser-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-5_0-0 Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_1-0 Operating systems & Components / Operating system package or component webkit-jsc-5.0-debuginfo Operating systems & Components / Operating system package or component typelib-1_0-WebKit2-4_0 Operating systems & Components / Operating system package or component webkit2gtk3-devel Operating systems & Components / Operating system package or component webkit2gtk-4_0-injected-bundles Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_1-0-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37-debuginfo Operating systems & Components / Operating system package or component webkit2gtk4-devel Operating systems & Components / Operating system package or component webkit-jsc-4.1-debuginfo Operating systems & Components / Operating system package or component typelib-1_0-WebKit2-4_1 Operating systems & Components / Operating system package or component typelib-1_0-JavaScriptCore-4_0 Operating systems & Components / Operating system package or component webkit-jsc-4.1 Operating systems & Components / Operating system package or component libjavascriptcoregtk-5_0-0 Operating systems & Components / Operating system package or component webkit2gtk3-soup2-debugsource Operating systems & Components / Operating system package or component webkit2gtk-5_0-injected-bundles Operating systems & Components / Operating system package or component typelib-1_0-WebKit2-5_0 Operating systems & Components / Operating system package or component libwebkit2gtk-5_0-0-debuginfo Operating systems & Components / Operating system package or component webkit-jsc-4 Operating systems & Components / Operating system package or component webkit-jsc-4-debuginfo Operating systems & Components / Operating system package or component webkit2gtk4-debugsource Operating systems & Components / Operating system package or component webkit2gtk-4_1-injected-bundles Operating systems & Components / Operating system package or component webkit-jsc-5.0 Operating systems & Components / Operating system package or component typelib-1_0-WebKit2WebExtension-4_1 Operating systems & Components / Operating system package or component typelib-1_0-WebKit2WebExtension-4_0 Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18 Operating systems & Components / Operating system package or component webkit2gtk3-debugsource Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18-debuginfo Operating systems & Components / Operating system package or component webkit2gtk4-minibrowser-debuginfo Operating systems & Components / Operating system package or component webkit2gtk-4_1-injected-bundles-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_1-0 Operating systems & Components / Operating system package or component libjavascriptcoregtk-5_0-0-debuginfo Operating systems & Components / Operating system package or component webkit2gtk3-soup2-minibrowser-debuginfo Operating systems & Components / Operating system package or component WebKit2GTK-4.0-lang Operating systems & Components / Operating system package or component WebKit2GTK-4.1-lang Operating systems & Components / Operating system package or component WebKit2GTK-5.0-lang Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU59207
Risk: High
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-0108
CWE-ID:
CWE-358 - Improperly Implemented Security Check for Standard
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to incorrect implementation in Navigation in Google Chrome. A remote attacker can create a specially crafted web page, trick the victim into visiting it and gain access to sensitive information.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU73806
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-32885
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67199
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-32886
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing web content in WebKit. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU67198
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-32912
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it using the affected software, trigger out-of-bounds read and execute arbitrary code on the target system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75417
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-25358
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebCore::RenderLayer::addChild. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75416
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-25360
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebCore::RenderLayer::renderer. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75415
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-25361
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebCore::RenderLayer::setNextSibling. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75414
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-25362
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebCore::RenderLayer::repaintBlockSelectionGaps. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU75413
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2023-25363
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebCore::RenderLayer::updateDescendantDependentFlags. A remote attacker can trick the victim to visit a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74085
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-27932
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass Same Origin Policy restrictions.
The vulnerability exists due to improper state management. A remote attacker can trick the victim to visit a specially crafted website and bypass Same Origin Policy restrictions.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74086
Risk: Medium
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-27954
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can track sensitive user information.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU74604
Risk: Critical
CVSSv4.0: 9.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Red]
CVE-ID: CVE-2023-28205
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing HTML content in WebKit. A remote attacker can trick the victim to open a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Note, the vulnerability is being actively exploited in the wild.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsDevelopment Tools Module: 15-SP4
Desktop Applications Module: 15-SP4
SUSE Linux Enterprise Server for SAP Applications 15: SP4
SUSE Linux Enterprise Server 15: SP4
SUSE Linux Enterprise Real Time 15: SP4
SUSE Linux Enterprise High Performance Computing 15: SP4
SUSE Linux Enterprise Desktop 15: SP4
Basesystem Module: 15-SP4
SUSE Manager Retail Branch Server: 4.3
SUSE Manager Server: 4.3
SUSE Manager Proxy: 4.3
openSUSE Leap: 15.4
libwebkit2gtk-4_1-0-32bit-debuginfo: All versions
libwebkit2gtk-4_1-0-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit: All versions
libwebkit2gtk-4_0-37-32bit-debuginfo: All versions
libjavascriptcoregtk-4_0-18-32bit-debuginfo: All versions
libwebkit2gtk-4_0-37-32bit: All versions
libjavascriptcoregtk-4_1-0-32bit: All versions
webkit2gtk3-minibrowser: All versions
webkit2gtk-4_0-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_0-37: All versions
typelib-1_0-WebKit2WebExtension-5_0: All versions
webkit2gtk3-soup2-devel: All versions
typelib-1_0-JavaScriptCore-5_0: All versions
webkit2gtk4-minibrowser: All versions
typelib-1_0-JavaScriptCore-4_1: All versions
libwebkit2gtk-4_1-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser: All versions
webkit2gtk-5_0-injected-bundles-debuginfo: All versions
webkit2gtk3-minibrowser-debuginfo: All versions
libwebkit2gtk-5_0-0: All versions
libjavascriptcoregtk-4_1-0: All versions
webkit-jsc-5.0-debuginfo: All versions
typelib-1_0-WebKit2-4_0: All versions
webkit2gtk3-devel: All versions
webkit2gtk-4_0-injected-bundles: All versions
libjavascriptcoregtk-4_1-0-debuginfo: All versions
libwebkit2gtk-4_0-37-debuginfo: All versions
webkit2gtk4-devel: All versions
webkit-jsc-4.1-debuginfo: All versions
typelib-1_0-WebKit2-4_1: All versions
typelib-1_0-JavaScriptCore-4_0: All versions
webkit-jsc-4.1: All versions
libjavascriptcoregtk-5_0-0: All versions
webkit2gtk3-soup2-debugsource: All versions
webkit2gtk-5_0-injected-bundles: All versions
typelib-1_0-WebKit2-5_0: All versions
libwebkit2gtk-5_0-0-debuginfo: All versions
webkit-jsc-4: All versions
webkit-jsc-4-debuginfo: All versions
webkit2gtk4-debugsource: All versions
webkit2gtk-4_1-injected-bundles: All versions
webkit-jsc-5.0: All versions
typelib-1_0-WebKit2WebExtension-4_1: All versions
typelib-1_0-WebKit2WebExtension-4_0: All versions
libjavascriptcoregtk-4_0-18: All versions
webkit2gtk3-debugsource: All versions
libjavascriptcoregtk-4_0-18-debuginfo: All versions
webkit2gtk4-minibrowser-debuginfo: All versions
webkit2gtk-4_1-injected-bundles-debuginfo: All versions
libwebkit2gtk-4_1-0: All versions
libjavascriptcoregtk-5_0-0-debuginfo: All versions
webkit2gtk3-soup2-minibrowser-debuginfo: All versions
WebKit2GTK-4.0-lang: All versions
WebKit2GTK-4.1-lang: All versions
WebKit2GTK-5.0-lang: All versions
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20232065-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
Yes. This vulnerability is being exploited in the wild.