{"affected":[{"ecosystem_specific":{"binaries":[{"typelib-1_0-WebKit2WebExtension-4_0":"2.40.5-2.146.1","webkit2gtk3-devel":"2.40.5-2.146.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.5-2.146.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.40.5-2.146.1","libwebkit2gtk-4_0-37":"2.40.5-2.146.1","libwebkit2gtk3-lang":"2.40.5-2.146.1","typelib-1_0-JavaScriptCore-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2WebExtension-4_0":"2.40.5-2.146.1","webkit2gtk-4_0-injected-bundles":"2.40.5-2.146.1","webkit2gtk3-devel":"2.40.5-2.146.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.5-2.146.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.40.5-2.146.1","libwebkit2gtk-4_0-37":"2.40.5-2.146.1","libwebkit2gtk3-lang":"2.40.5-2.146.1","typelib-1_0-JavaScriptCore-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2WebExtension-4_0":"2.40.5-2.146.1","webkit2gtk-4_0-injected-bundles":"2.40.5-2.146.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.5-2.146.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18":"2.40.5-2.146.1","libwebkit2gtk-4_0-37":"2.40.5-2.146.1","libwebkit2gtk3-lang":"2.40.5-2.146.1","typelib-1_0-JavaScriptCore-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2-4_0":"2.40.5-2.146.1","typelib-1_0-WebKit2WebExtension-4_0":"2.40.5-2.146.1","webkit2gtk-4_0-injected-bundles":"2.40.5-2.146.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.5-2.146.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libjavascriptcoregtk-4_0-18-32bit":"2.40.5-2.146.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 12 SP5","name":"webkit2gtk3","purl":"pkg:rpm/suse/webkit2gtk3&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.40.5-2.146.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.40.5 (bsc#1213905):\n\n- CVE-2023-38133: Fixed information disclosure.\n- CVE-2023-38572: Fixed Same-Origin-Policy bypass.\n- CVE-2023-38592: Fixed arbitrary code execution.\n- CVE-2023-38594: Fixed arbitrary code execution.\n- CVE-2023-38595: Fixed arbitrary code execution.\n- CVE-2023-38597: Fixed arbitrary code execution.\n- CVE-2023-38599: Fixed sensitive user information tracking.\n- CVE-2023-38600: Fixed arbitrary code execution.\n- CVE-2023-38611: Fixed arbitrary code execution.\n\nUpdate to version 2.40.3 (bsc#1212863):\n\n- CVE-2023-32439: Fixed a bug where processing maliciously crafted web content may lead to arbitrary code execution. (bsc#1212863) \n- CVE-2023-32435: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)\n- CVE-2022-48503: Fixed a bug where processing web content may lead to arbitrary code execution. (bsc#1212863)\n","id":"SUSE-SU-2023:3237-1","modified":"2023-08-08T16:17:12Z","published":"2023-08-08T16:17:12Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20233237-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212863"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213905"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48503"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-32435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-32439"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38133"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38572"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-38611"}],"related":["CVE-2022-48503","CVE-2023-32435","CVE-2023-32439","CVE-2023-38133","CVE-2023-38572","CVE-2023-38592","CVE-2023-38594","CVE-2023-38595","CVE-2023-38597","CVE-2023-38599","CVE-2023-38600","CVE-2023-38611"],"summary":"Security update for webkit2gtk3","upstream":["CVE-2022-48503","CVE-2023-32435","CVE-2023-32439","CVE-2023-38133","CVE-2023-38572","CVE-2023-38592","CVE-2023-38594","CVE-2023-38595","CVE-2023-38597","CVE-2023-38599","CVE-2023-38600","CVE-2023-38611"]}