SUSE-SU-2024:1293-1

Advisory lineage Upstream: 8 Downstream: 0
Published: 15 Apr 2024, 14:48
Last modified:04 Feb 2026, 02:29

Vulnerability Summary

Overall Risk (default)
minimal
0/100
CVSS Score
No data
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

15 Apr 2024, 14:48
Published
Vulnerability first disclosed
04 Feb 2026, 02:29
Last Modified
Vulnerability information updated

Description

Security update for webkit2gtk3 webkit2gtk3 was updated to fix the following issues: Update to version 2.44.0 (boo#1222010): - CVE-2024-23252: Credit to anbu1024 of SecANT. Impact: Processing web content may lead to a denial-of-service. Description: The issue was addressed with improved memory handling. - CVE-2024-23254: Credit to James Lee (@Windowsrcer). Impact: A malicious website may exfiltrate audio data cross-origin. Description: The issue was addressed with improved UI handling. - CVE-2024-23263: Credit to Johan Carlsson (joaxcar). Impact: Processing maliciously crafted web content may prevent Content Security Policy from being enforced. Description: A logic issue was addressed with improved validation. - CVE-2024-23280: Credit to An anonymous researcher. Impact: A maliciously crafted webpage may be able to fingerprint the user. Description: An injection issue was addressed with improved validation. - CVE-2024-23284: Credit to Georg Felber and Marco Squarcina. Impact: Processing maliciously crafted web content may prevent Content Security Policy from being enforced. Description: A logic issue was addressed with improved state management. - CVE-2023-42950: Credit to Nan Wang (@eternalsakura13) of 360 Vulnerability Research Institute and rushikesh nandedkar. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Description: A use after free issue was addressed with improved memory management. - CVE-2023-42956: Credit to SungKwon Lee (Demon.Team). Impact: Processing web content may lead to a denial-of-service. Description: The issue was addressed with improved memory handling. - CVE-2023-42843: Credit to Kacper Kwapisz (@KKKas_). Impact: Visiting a malicious website may lead to address bar spoofing. Description: An inconsistent user interface issue was addressed with improved state management. + Make the DOM accessibility tree reachable from UI process with GTK4. + Removed the X11 and WPE renderers in favor of DMA-BUF. + Improved vblank synchronization when rendering. + Removed key event reinjection in GTK4 to make keyboard shortcuts work in web sites. + Fix gamepads detection by correctly handling focused window in GTK4. - Use WebAssembly on aarch64. It is the upstream default and no longer makes the build fail. Stop passing -DENABLE_C_LOOP=ON, -DENABLE_WEBASSEMBLY=OFF and -DENABLE_SAMPLING_PROFILER=OFF for the same reason.

Affected Systems

  • susewebkit2gtk3&distro=SUSE Linux Enterprise Server 12 SP5

    < 2.44.0-4.3.2

  • susewebkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5

    < 2.44.0-4.3.2

  • susewebkit2gtk3&distro=SUSE Linux Enterprise Software Development Kit 12 SP5

    < 2.44.0-4.3.2

  • susewebkit2gtk3&distro=SUSE Linux Enterprise Workstation Extension 12 SP5

    < 2.44.0-4.3.2

References (10)