Risk | High |
Patch available | YES |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2024-27856 CVE-2024-54543 CVE-2024-54658 CVE-2025-24143 CVE-2025-24150 CVE-2025-24158 CVE-2025-24162 |
CWE-ID | CWE-416 CWE-119 CWE-200 CWE-78 CWE-20 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 SP5 Operating systems & Components / Operating system SUSE Linux Enterprise Server for SAP Applications 12 Operating systems & Components / Operating system SUSE Linux Enterprise Server 12 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 12 Operating systems & Components / Operating system webkit2gtk-4_0-injected-bundles-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk3-lang Operating systems & Components / Operating system package or component typelib-1_0-WebKit2-4_0 Operating systems & Components / Operating system package or component webkit2gtk3-debugsource Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37-debuginfo Operating systems & Components / Operating system package or component libwebkit2gtk-4_0-37 Operating systems & Components / Operating system package or component webkit2gtk3-devel Operating systems & Components / Operating system package or component typelib-1_0-JavaScriptCore-4_0 Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18 Operating systems & Components / Operating system package or component libjavascriptcoregtk-4_0-18-debuginfo Operating systems & Components / Operating system package or component webkit2gtk-4_0-injected-bundles Operating systems & Components / Operating system package or component typelib-1_0-WebKit2WebExtension-4_0 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU103095
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-27856
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when handling Text objects. A remote attacker can trick the victim into visiting a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103748
Risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2024-54543
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103750
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-54658
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and crash the browser.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103352
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-24143
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to fingerprint users.
The vulnerability exists due to excessive data output by WebKit. A remote attacker can trick the victim into visiting a specially crafted website and fingerprint the user.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103355
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2025-24150
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in WebKit Web Inspector. A remote attacker can trick the victim into copying a specially crafted URL from the WebKit Web Inspector and execute arbitrary OS commands on the system.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103353
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-24158
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when handling HTML content in WebKit. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and perform a denial of service (DoS) attack.
Update the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU103354
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-24162
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and perform a denial of service (DoS) attack.
MitigationUpdate the affected package webkit2gtk3 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 12 SP5 LTSS Extended: Security
SUSE Linux Enterprise Server 12 SP5: LTSS
SUSE Linux Enterprise Server for SAP Applications 12: SP5
SUSE Linux Enterprise Server 12: SP5
SUSE Linux Enterprise High Performance Computing 12: SP5
webkit2gtk-4_0-injected-bundles-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk3-lang: before 2.46.6-4.28.1
typelib-1_0-WebKit2-4_0: before 2.46.6-4.28.1
webkit2gtk3-debugsource: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37-debuginfo: before 2.46.6-4.28.1
libwebkit2gtk-4_0-37: before 2.46.6-4.28.1
webkit2gtk3-devel: before 2.46.6-4.28.1
typelib-1_0-JavaScriptCore-4_0: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18: before 2.46.6-4.28.1
libjavascriptcoregtk-4_0-18-debuginfo: before 2.46.6-4.28.1
webkit2gtk-4_0-injected-bundles: before 2.46.6-4.28.1
typelib-1_0-WebKit2WebExtension-4_0: before 2.46.6-4.28.1
CPE2.3https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.