vulnerability

SUSE: CVE-2023-32373: SUSE Linux Security Advisory

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Jun 22, 2023
Added
Jun 23, 2023
Modified
Jan 28, 2025

Description

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Solution(s)

suse-upgrade-libjavascriptcoregtk-4_0-18suse-upgrade-libjavascriptcoregtk-4_0-18-32bitsuse-upgrade-libjavascriptcoregtk-4_1-0suse-upgrade-libjavascriptcoregtk-4_1-0-32bitsuse-upgrade-libjavascriptcoregtk-5_0-0suse-upgrade-libwebkit2gtk-4_0-37suse-upgrade-libwebkit2gtk-4_0-37-32bitsuse-upgrade-libwebkit2gtk-4_1-0suse-upgrade-libwebkit2gtk-4_1-0-32bitsuse-upgrade-libwebkit2gtk-5_0-0suse-upgrade-libwebkit2gtk3-langsuse-upgrade-typelib-1_0-javascriptcore-4_0suse-upgrade-typelib-1_0-javascriptcore-4_1suse-upgrade-typelib-1_0-javascriptcore-5_0suse-upgrade-typelib-1_0-webkit2-4_0suse-upgrade-typelib-1_0-webkit2-4_1suse-upgrade-typelib-1_0-webkit2-5_0suse-upgrade-typelib-1_0-webkit2webextension-4_0suse-upgrade-typelib-1_0-webkit2webextension-4_1suse-upgrade-typelib-1_0-webkit2webextension-5_0suse-upgrade-webkit-jsc-4suse-upgrade-webkit-jsc-4-1suse-upgrade-webkit-jsc-5-0suse-upgrade-webkit2gtk-4-0-langsuse-upgrade-webkit2gtk-4-1-langsuse-upgrade-webkit2gtk-4_0-injected-bundlessuse-upgrade-webkit2gtk-4_1-injected-bundlessuse-upgrade-webkit2gtk-5-0-langsuse-upgrade-webkit2gtk-5_0-injected-bundlessuse-upgrade-webkit2gtk3-develsuse-upgrade-webkit2gtk3-minibrowsersuse-upgrade-webkit2gtk3-soup2-develsuse-upgrade-webkit2gtk3-soup2-minibrowsersuse-upgrade-webkit2gtk4-develsuse-upgrade-webkit2gtk4-minibrowser
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.