[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-OPENSUSE-SU-2022:0705-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-07T15:11:42.125Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":42,"duplicates":43,"related":44,"reserved_at":9,"published_at":59,"modified_at":60,"state":9,"summary":61,"references_raw":63,"kevs":140,"epss":9,"epss_history":141,"metrics":142,"affected":143},"OPENSUSE-SU-2022:0705-1","Security update for webkit2gtk3\n\nThis update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.34.6 (bsc#1196133):\n\n- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.\n\nUpdate to version 2.34.5 (bsc#1195735):\n\n- CVE-2022-22589: A validation issue was addressed with improved input sanitization.\n- CVE-2022-22590: A use after free issue was addressed with improved memory management.\n- CVE-2022-22592: A logic issue was addressed with improved state management.\n\nUpdate to version 2.34.4 (bsc#1195064):\n\n- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.\n- CVE-2021-30936: A use after free issue was addressed with improved memory management.\n- CVE-2021-30951: A use after free issue was addressed with improved memory management.\n- CVE-2021-30952: An integer overflow was addressed with improved input validation.\n- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.\n- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.\n- CVE-2021-30984: A race condition was addressed with improved state handling.\n- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.\n\nThe following CVEs were addressed in a previous update:\n\n- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.\n- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.\n- CVE-2021-45483: A use-after-free in WebCore::Frame::page.\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40],{"_key":15},"CVE-2021-30934",{"_key":17},"CVE-2021-30936",{"_key":19},"CVE-2021-30951",{"_key":21},"CVE-2021-30952",{"_key":23},"CVE-2021-30953",{"_key":25},"CVE-2021-30954",{"_key":27},"CVE-2021-30984",{"_key":29},"CVE-2021-45481",{"_key":31},"CVE-2021-45482",{"_key":33},"CVE-2021-45483",{"_key":35},"CVE-2022-22589",{"_key":37},"CVE-2022-22590",{"_key":39},"CVE-2022-22592",{"_key":41},"CVE-2022-22620",[],[],[45,46,47,48,49,50,51,52,53,54,55,56,57,58],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},"2022-03-04T06:45:18Z","2026-02-04T02:24:05.992513Z",{"cisa_kev":62,"cisa_ransomware":62,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[64,70,75,79,83,88,92,96,100,104,108,112,116,120,124,128,132,136],{"url":65,"sources":66,"tags":68},"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/",[67],"osv_opensuse",[69],"Advisory",{"url":71,"sources":72,"tags":73},"https://bugzilla.suse.com/1195064",[67],[74],"REPORT",{"url":76,"sources":77,"tags":78},"https://bugzilla.suse.com/1195735",[67],[74],{"url":80,"sources":81,"tags":82},"https://bugzilla.suse.com/1196133",[67],[74],{"url":84,"sources":85,"tags":86},"https://www.suse.com/security/cve/CVE-2021-30934",[67],[87],"WEB",{"url":89,"sources":90,"tags":91},"https://www.suse.com/security/cve/CVE-2021-30936",[67],[87],{"url":93,"sources":94,"tags":95},"https://www.suse.com/security/cve/CVE-2021-30951",[67],[87],{"url":97,"sources":98,"tags":99},"https://www.suse.com/security/cve/CVE-2021-30952",[67],[87],{"url":101,"sources":102,"tags":103},"https://www.suse.com/security/cve/CVE-2021-30953",[67],[87],{"url":105,"sources":106,"tags":107},"https://www.suse.com/security/cve/CVE-2021-30954",[67],[87],{"url":109,"sources":110,"tags":111},"https://www.suse.com/security/cve/CVE-2021-30984",[67],[87],{"url":113,"sources":114,"tags":115},"https://www.suse.com/security/cve/CVE-2021-45481",[67],[87],{"url":117,"sources":118,"tags":119},"https://www.suse.com/security/cve/CVE-2021-45482",[67],[87],{"url":121,"sources":122,"tags":123},"https://www.suse.com/security/cve/CVE-2021-45483",[67],[87],{"url":125,"sources":126,"tags":127},"https://www.suse.com/security/cve/CVE-2022-22589",[67],[87],{"url":129,"sources":130,"tags":131},"https://www.suse.com/security/cve/CVE-2022-22590",[67],[87],{"url":133,"sources":134,"tags":135},"https://www.suse.com/security/cve/CVE-2022-22592",[67],[87],{"url":137,"sources":138,"tags":139},"https://www.suse.com/security/cve/CVE-2022-22620",[67],[87],[],[],[],[144],{"ecosystem":145,"name":146,"vendor":147,"product":148,"cpe_part":9,"purl_type":149,"purl_namespace":147,"purl_name":148,"source":9,"versions":150},"openSUSE","webkit2gtk3","opensuse","webkit2gtk3&distro=openSUSE Leap 15.3","rpm",[151],{"version":152,"is_range":153,"range_type":154,"version_start":9,"version_start_type":9,"version_end":155,"version_end_type":156,"fixed_in":9},"lt2_34_6_29_1",true,"ecosystem","2.34.6-29.1","excluding"]