vulnerability
SUSE: CVE-2023-40414: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Jan 10, 2024 | Feb 19, 2024 | Jan 28, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 10, 2024
Added
Feb 19, 2024
Modified
Jan 28, 2025
Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution.
Solution(s)
suse-upgrade-libjavascriptcoregtk-4_0-18suse-upgrade-libjavascriptcoregtk-4_0-18-32bitsuse-upgrade-libjavascriptcoregtk-4_1-0suse-upgrade-libjavascriptcoregtk-4_1-0-32bitsuse-upgrade-libjavascriptcoregtk-6_0-1suse-upgrade-libwebkit2gtk-4_0-37suse-upgrade-libwebkit2gtk-4_0-37-32bitsuse-upgrade-libwebkit2gtk-4_1-0suse-upgrade-libwebkit2gtk-4_1-0-32bitsuse-upgrade-libwebkit2gtk3-langsuse-upgrade-libwebkitgtk-6_0-4suse-upgrade-typelib-1_0-javascriptcore-4_0suse-upgrade-typelib-1_0-javascriptcore-4_1suse-upgrade-typelib-1_0-javascriptcore-6_0suse-upgrade-typelib-1_0-webkit-6_0suse-upgrade-typelib-1_0-webkit2-4_0suse-upgrade-typelib-1_0-webkit2-4_1suse-upgrade-typelib-1_0-webkit2webextension-4_0suse-upgrade-typelib-1_0-webkit2webextension-4_1suse-upgrade-typelib-1_0-webkitwebprocessextension-6_0suse-upgrade-webkit-jsc-4suse-upgrade-webkit-jsc-4-1suse-upgrade-webkit-jsc-6-0suse-upgrade-webkit2gtk-4_0-injected-bundlessuse-upgrade-webkit2gtk-4_1-injected-bundlessuse-upgrade-webkit2gtk3-develsuse-upgrade-webkit2gtk3-minibrowsersuse-upgrade-webkit2gtk3-soup2-develsuse-upgrade-webkit2gtk3-soup2-minibrowsersuse-upgrade-webkit2gtk4-develsuse-upgrade-webkit2gtk4-minibrowsersuse-upgrade-webkitgtk-4-0-langsuse-upgrade-webkitgtk-4-1-langsuse-upgrade-webkitgtk-6-0-langsuse-upgrade-webkitgtk-6_0-injected-bundles

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.