[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2024:1293-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T08:11:26.341Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":30,"duplicates":31,"related":32,"reserved_at":9,"published_at":41,"modified_at":42,"state":9,"summary":43,"references_raw":45,"kevs":90,"epss":9,"epss_history":91,"metrics":92,"affected":93},"SUSE-SU-2024:1293-1","Security update for webkit2gtk3\n\n\nwebkit2gtk3 was updated to fix the following issues:\n\nUpdate to version 2.44.0 (boo#1222010):\n\n- CVE-2024-23252:\n\n    Credit to anbu1024 of SecANT.\n    Impact: Processing web content may lead to a denial-of-service.\n    Description: The issue was addressed with improved memory handling.\n\n- CVE-2024-23254:\n\n    Credit to James Lee (@Windowsrcer).\n    Impact: A malicious website may exfiltrate audio data cross-origin.\n    Description: The issue was addressed with improved UI handling.\n\n- CVE-2024-23263:\n\n    Credit to Johan Carlsson (joaxcar).\n    Impact: Processing maliciously crafted web content may prevent\n    Content Security Policy from being enforced. Description: A logic\n    issue was addressed with improved validation.\n\n- CVE-2024-23280:\n\n    Credit to An anonymous researcher.\n    Impact: A maliciously crafted webpage may be able to fingerprint the\n    user. Description: An injection issue was addressed with improved\n    validation.\n\n- CVE-2024-23284:\n\n    Credit to Georg Felber and Marco Squarcina.\n    Impact: Processing maliciously crafted web content may prevent\n    Content Security Policy from being enforced. Description: A logic\n    issue was addressed with improved state management.\n\n- CVE-2023-42950:\n\n    Credit to Nan Wang (@eternalsakura13) of 360 Vulnerability Research\n    Institute and rushikesh nandedkar.\n    Impact: Processing maliciously crafted web content may lead to\n    arbitrary code execution. Description: A use after free issue was\n    addressed with improved memory management.\n\n- CVE-2023-42956:\n\n    Credit to SungKwon Lee (Demon.Team).\n    Impact: Processing web content may lead to a denial-of-service.\n    Description: The issue was addressed with improved memory handling.\n\n- CVE-2023-42843:\n\n    Credit to Kacper Kwapisz (@KKKas_).\n    Impact: Visiting a malicious website may lead to address bar\n    spoofing. Description: An inconsistent user interface issue was\n    addressed with improved state management.\n\n\n+ Make the DOM accessibility tree reachable from UI process with GTK4.\n+ Removed the X11 and WPE renderers in favor of DMA-BUF.\n+ Improved vblank synchronization when rendering.\n+ Removed key event reinjection in GTK4 to make keyboard shortcuts work in web sites.\n+ Fix gamepads detection by correctly handling focused window in GTK4.\n\n- Use WebAssembly on aarch64. It is the upstream default and no\n  longer makes the build fail. Stop passing -DENABLE_C_LOOP=ON,\n  -DENABLE_WEBASSEMBLY=OFF and -DENABLE_SAMPLING_PROFILER=OFF for\n  the same reason.\n",null,[],[],[],[14,16,18,20,22,24,26,28],{"_key":15},"CVE-2023-42843",{"_key":17},"CVE-2023-42950",{"_key":19},"CVE-2023-42956",{"_key":21},"CVE-2024-23252",{"_key":23},"CVE-2024-23254",{"_key":25},"CVE-2024-23263",{"_key":27},"CVE-2024-23280",{"_key":29},"CVE-2024-23284",[],[],[33,34,35,36,37,38,39,40],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},{"_key":25},{"_key":27},{"_key":29},"2024-04-15T14:48:15Z","2026-02-04T02:29:44.646573Z",{"cisa_kev":44,"cisa_ransomware":44,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[46,52,57,62,66,70,74,78,82,86],{"url":47,"sources":48,"tags":50},"https://www.suse.com/support/update/announcement/2024/suse-su-20241293-1/",[49],"osv_suse",[51],"Advisory",{"url":53,"sources":54,"tags":55},"https://bugzilla.suse.com/1222010",[49],[56],"REPORT",{"url":58,"sources":59,"tags":60},"https://www.suse.com/security/cve/CVE-2023-42843",[49],[61],"WEB",{"url":63,"sources":64,"tags":65},"https://www.suse.com/security/cve/CVE-2023-42950",[49],[61],{"url":67,"sources":68,"tags":69},"https://www.suse.com/security/cve/CVE-2023-42956",[49],[61],{"url":71,"sources":72,"tags":73},"https://www.suse.com/security/cve/CVE-2024-23252",[49],[61],{"url":75,"sources":76,"tags":77},"https://www.suse.com/security/cve/CVE-2024-23254",[49],[61],{"url":79,"sources":80,"tags":81},"https://www.suse.com/security/cve/CVE-2024-23263",[49],[61],{"url":83,"sources":84,"tags":85},"https://www.suse.com/security/cve/CVE-2024-23280",[49],[61],{"url":87,"sources":88,"tags":89},"https://www.suse.com/security/cve/CVE-2024-23284",[49],[61],[],[],[],[94,107,111,115],{"ecosystem":95,"name":96,"vendor":97,"product":98,"cpe_part":9,"purl_type":99,"purl_namespace":97,"purl_name":98,"source":9,"versions":100},"SUSE Linux Enterprise","webkit2gtk3","suse","webkit2gtk3&distro=SUSE Linux Enterprise Server 12 SP5","rpm",[101],{"version":102,"is_range":103,"range_type":104,"version_start":9,"version_start_type":9,"version_end":105,"version_end_type":106,"fixed_in":9},"lt2_44_0_4_3_2",true,"ecosystem","2.44.0-4.3.2","excluding",{"ecosystem":95,"name":96,"vendor":97,"product":108,"cpe_part":9,"purl_type":99,"purl_namespace":97,"purl_name":108,"source":9,"versions":109},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5",[110],{"version":102,"is_range":103,"range_type":104,"version_start":9,"version_start_type":9,"version_end":105,"version_end_type":106,"fixed_in":9},{"ecosystem":95,"name":96,"vendor":97,"product":112,"cpe_part":9,"purl_type":99,"purl_namespace":97,"purl_name":112,"source":9,"versions":113},"webkit2gtk3&distro=SUSE Linux Enterprise Software Development Kit 12 SP5",[114],{"version":102,"is_range":103,"range_type":104,"version_start":9,"version_start_type":9,"version_end":105,"version_end_type":106,"fixed_in":9},{"ecosystem":95,"name":96,"vendor":97,"product":116,"cpe_part":9,"purl_type":99,"purl_namespace":97,"purl_name":116,"source":9,"versions":117},"webkit2gtk3&distro=SUSE Linux Enterprise Workstation Extension 12 SP5",[118],{"version":102,"is_range":103,"range_type":104,"version_start":9,"version_start_type":9,"version_end":105,"version_end_type":106,"fixed_in":9}]