[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-SUSE-SU-2024:4167-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":24,"duplicates":25,"related":26,"reserved_at":9,"published_at":32,"modified_at":33,"state":9,"summary":34,"references_raw":36,"kevs":77,"epss":9,"epss_history":78,"metrics":79,"affected":80},"SUSE-SU-2024:4167-1","Security update for webkit2gtk3\n\nThis update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.46.3 (bsc#1232747), including fixes for:\n\n- CVE-2024-44308: Fixed arbitrary code execution by not allocating DFG register after a slow path (bsc#1233631).\n- CVE-2024-44309: Fixed a data isolation bypass vulnerability (bsc#1233632).\n- CVE-2024-44244: Processing maliciously crafted web content may lead to an unexpected process crash.\n- CVE-2024-44296: Processing maliciously crafted web content may prevent Content Security Policy from being enforced.\n",null,[],[],[],[14,16,18,20,22],{"_key":15},"CVE-2024-44185",{"_key":17},"CVE-2024-44244",{"_key":19},"CVE-2024-44296",{"_key":21},"CVE-2024-44308",{"_key":23},"CVE-2024-44309",[],[],[27,28,29,30,31],{"_key":15},{"_key":17},{"_key":19},{"_key":21},{"_key":23},"2024-12-04T10:32:18Z","2026-02-04T04:37:11.176416Z",{"cisa_kev":35,"cisa_ransomware":35,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[37,43,48,52,56,61,65,69,73],{"url":38,"sources":39,"tags":41},"https://www.suse.com/support/update/announcement/2024/suse-su-20244167-1/",[40],"osv_suse",[42],"Advisory",{"url":44,"sources":45,"tags":46},"https://bugzilla.suse.com/1232747",[40],[47],"REPORT",{"url":49,"sources":50,"tags":51},"https://bugzilla.suse.com/1233631",[40],[47],{"url":53,"sources":54,"tags":55},"https://bugzilla.suse.com/1233632",[40],[47],{"url":57,"sources":58,"tags":59},"https://www.suse.com/security/cve/CVE-2024-44185",[40],[60],"WEB",{"url":62,"sources":63,"tags":64},"https://www.suse.com/security/cve/CVE-2024-44244",[40],[60],{"url":66,"sources":67,"tags":68},"https://www.suse.com/security/cve/CVE-2024-44296",[40],[60],{"url":70,"sources":71,"tags":72},"https://www.suse.com/security/cve/CVE-2024-44308",[40],[60],{"url":74,"sources":75,"tags":76},"https://www.suse.com/security/cve/CVE-2024-44309",[40],[60],[],[],[],[81,94,98,102,106,110,114],{"ecosystem":82,"name":83,"vendor":84,"product":85,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":85,"source":9,"versions":87},"SUSE Linux Enterprise","webkit2gtk3","suse","webkit2gtk3&distro=SUSE Enterprise Storage 7.1","rpm",[88],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},"lt2_46_3_150200_127_1",true,"ecosystem","2.46.3-150200.127.1","excluding",{"ecosystem":82,"name":83,"vendor":84,"product":95,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":95,"source":9,"versions":96},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",[97],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},{"ecosystem":82,"name":83,"vendor":84,"product":99,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":99,"source":9,"versions":100},"webkit2gtk3&distro=SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",[101],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},{"ecosystem":82,"name":83,"vendor":84,"product":103,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":103,"source":9,"versions":104},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP2-LTSS",[105],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},{"ecosystem":82,"name":83,"vendor":84,"product":107,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":107,"source":9,"versions":108},"webkit2gtk3&distro=SUSE Linux Enterprise Server 15 SP3-LTSS",[109],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},{"ecosystem":82,"name":83,"vendor":84,"product":111,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":111,"source":9,"versions":112},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP2",[113],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9},{"ecosystem":82,"name":83,"vendor":84,"product":115,"cpe_part":9,"purl_type":86,"purl_namespace":84,"purl_name":115,"source":9,"versions":116},"webkit2gtk3&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3",[117],{"version":89,"is_range":90,"range_type":91,"version_start":9,"version_start_type":9,"version_end":92,"version_end_type":93,"fixed_in":9}]