vulnerability
SUSE: CVE-2022-42826: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Feb 23, 2023 | Feb 24, 2023 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Feb 23, 2023
Added
Feb 24, 2023
Modified
Jan 28, 2025
Description
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution.
Solutions
suse-upgrade-libjavascriptcoregtk-4_0-18suse-upgrade-libjavascriptcoregtk-4_0-18-32bitsuse-upgrade-libjavascriptcoregtk-4_1-0suse-upgrade-libjavascriptcoregtk-4_1-0-32bitsuse-upgrade-libjavascriptcoregtk-5_0-0suse-upgrade-libwebkit2gtk-4_0-37suse-upgrade-libwebkit2gtk-4_0-37-32bitsuse-upgrade-libwebkit2gtk-4_1-0suse-upgrade-libwebkit2gtk-4_1-0-32bitsuse-upgrade-libwebkit2gtk-5_0-0suse-upgrade-libwebkit2gtk3-langsuse-upgrade-typelib-1_0-javascriptcore-4_0suse-upgrade-typelib-1_0-javascriptcore-4_1suse-upgrade-typelib-1_0-javascriptcore-5_0suse-upgrade-typelib-1_0-webkit2-4_0suse-upgrade-typelib-1_0-webkit2-4_1suse-upgrade-typelib-1_0-webkit2-5_0suse-upgrade-typelib-1_0-webkit2webextension-4_0suse-upgrade-typelib-1_0-webkit2webextension-4_1suse-upgrade-typelib-1_0-webkit2webextension-5_0suse-upgrade-webkit-jsc-4suse-upgrade-webkit-jsc-4-1suse-upgrade-webkit-jsc-5-0suse-upgrade-webkit2gtk-4-0-langsuse-upgrade-webkit2gtk-4-1-langsuse-upgrade-webkit2gtk-4_0-injected-bundlessuse-upgrade-webkit2gtk-4_1-injected-bundlessuse-upgrade-webkit2gtk-5-0-langsuse-upgrade-webkit2gtk-5_0-injected-bundlessuse-upgrade-webkit2gtk3-develsuse-upgrade-webkit2gtk3-minibrowsersuse-upgrade-webkit2gtk3-soup2-develsuse-upgrade-webkit2gtk3-soup2-minibrowsersuse-upgrade-webkit2gtk4-develsuse-upgrade-webkit2gtk4-minibrowser
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.